News
-
"NHS ransomware: WannaCry shuts down Honda plant"WannaCry is still continuing its attacks on organizations as shown by a recent hit to Honda’s car manufacturing plant in Japan. After being struck by the WannaCry ransomware, Honda took action by shutting its plant down. Though Microsoft has provided…
-
"This malvertising campaign infected PCs with ransomware without users even clicking a link"A malvertising campaign is suspected to be the cause of the ransomware attack that targeted UK universities and was able to be launched via a click to a site with the malware. Cybersecurity researchers at Proofpoint has identified this ransomware as Mole…
-
"What is GhostHook? New technique allows hackers to bypass Windows 10 PatchGuard"Security experts at CyberArk have discovered a new attack technique, called GhostHook, which could allow hackers to evade kernel protections of Windows 10 PatchGaurd and plant rootkits within systems. According to researchers, this technique is only…
-
"‘Breakthrough’ Cisco New Network Uses Machine Learning To Detect Malware In Encrypted Data"Cisco has revealed its new network, which uses machine learning for the automation and security of enterprise networks. As claimed by Cisco, this network marks a significant development for enterprise networks as machine learning has been implemented to…
-
"World's Most Powerful Particle Collider Taps AI to Expose Hack Attacks"CERN is the European Organization for Nuclear Research lab, which holds a computer grid that is used by thousands of physicists to view and examine data produced by the Large Hadron Collider for the purpose of further understanding the underlying…
-
CyberSTEM Camps at Maryland CyberSecurity Center (2017)MC2 facilitates a wide variety of educational opportunities on the UMD campus. MC2 also sponsors a number of educational/outreach events for lower-school, middle-school, and high-school students, especially targeting women and under-…
-
"Growing Cyberthreat: Steganographic Malware Hiding In Images"Steganographic malware uses a technique that inserts a secret algorithm into an image, which is then sent to a targeted system where the information embedded within the image is extracted by malicious software to launch an attack. This attack is stealthy…
-
"A Diabolical Way of Hacking a Chip With a Wave of Your Hand"Founder of Red Balloon Security, Ang Cui, and research scientist, Rick Housley, have discovered a new way in which a processor could be hacked, with the use of self-built electromagnetic pulsing equipment to raise faults within targeted hardware. This…
-
"Insider threats fastest growing cybersecurity concern"According to survey results published by Harvey Nash/KPMG and observations made by cybersecurity experts at Spohn Security Solutions, a large portion of threats to cybersecurity originate from within an organization and this type of security risk is the…
-
"Stack Clash Vulnerability in Linux, BSD Systems Enables Root Access"Researchers have discovered a vulnerability known as Stack Clash that could allow an attacker to launch code via root access, which Linux, BSD, Solaris and other open source systems are vulnerable to. This article further discusses the risks posed by…
-
"Quantum Computing's Threat to Public-key Cryptosystems"There are concerns pertaining to what will be done about current public-key encryption when commercially viable quantum computers are fully available. Concerns arise from future quantum computing being able to break the current most popular public-key…
-
"Girl Scouts will offer new cybersecurity badges to increase its STEM focus"The Girl Scouts organization will be collaborating with Palo Alto Networks, an internet security company, to implement 18 new badges, which will recognize skills in cybersecurity. These badges will promote the learning of a variety of cyber topics,…