News
-
MIT issues Digital DiplomasI know, completing a degree in college was all about getting the sheepskin. Well a sign of advancement, MIT has annouced that they are debuing digital diplomas. It isn't so much as replacing the diploma with an image on your cell phone but making it…
-
SoS Musings #7 - Building Blocks for Security ScienceSoS Musings #7 Building Blocks for Security Science
-
"Is your organization receptive to adopting new Cybersecurity technology?"Sandia National Laboratories is working to enhance the cybersecurity adoption process by gaining insight from many organizations. To help identity barriers, take a quick survey. At the end you will be given feedback on potential barriers your…
-
"Google Security: Company Adds 'Advanced Protection Program' For High-Risk Users"Google has announced the launch of its Advanced Protection Program, which aims to provide new additional security options to users, particularly those who are more likely to be targeted by attackers online. This new program supports enhanced two-…
-
"Hackers Take Aim at SSH Keys in New Attacks"Hackers have intensified their scanning of servers hosting WordPress websites in order to gather SSH private keys. Upon further investigation after a customer reported scans being performed on their live traffic for SSH private keys, it has been…
-
"10 Social Engineering Attacks Your End Users Need to Know About"The Verizon Data Breach Investigations Report has revealed that 43 percent of breaches within the last year were a result of social engineering attacks. Attackers are using more nontraditional methods of performing social engineering attacks to steal…
-
"Majority of Java Apps Are Susceptible to Hack Attacks"Findings of the 2017 State of Software Security Report released by Veracode, emphasizes the importance of patching open source components used within applications to prevent security breaches. An overwhelming majority of Java applications consist of at…
-
"Unbreakable Encrypted Messages"Chinese researchers have reached a significant milestone in the advancement of quantum communication. Researchers have demonstrated the transmission of quantum-entangled photon pairs to two Tibetan mountaintops more than 700 miles apart with the use of a…
-
"FTC Urged to Investigate ‘Easy’ to Hack Smartwatches for Kids"Tests conducted by security firm, Mnemonic, and the Norwegian Consumer Council (NCC), reveals major security flaws within Internet-connected smartwatches for children. The exploitation of these vulnerabilities would allow attackers to perform a…
-
"Cybercriminals Hijacked a Government Server to Send Sophisticated Malware to U.S. Companies"Research conducted by Cisco’s Talos team and other cybersecurity experts has revealed the hijacking of U.S. state government servers by an Eastern European to distribute phishing emails containing complex malware. An advanced persistent (APT) group that…
-
"Study Finds Auto-Fix Tool Gets More Programmers to Upgrade Code"As shown by the major data breach faced by Equifax, significant consequences may arise when programmers neglect to make essential upgrades to their internal software code. Patches applied to external libraries that are relied upon by software programs to…
-
"Serious Encryption Flaw in Infineon RSA Chips Exposes Billions of Devices to Attack"A security flaw within Infineon’s RSA library has been discovered by researchers, which could allow the RSA private key that matches with a generated RSA public key to be determined by attackers. The exploitation of this security vulnerability could…