News
-
"Cloak-and-Dagger Attack Creates Android Device Takeover Risk"Researchers at Georgia Tech have recently discovered a new attack by the name of “Cloak and Dagger”, which can allow cyberattackers to take full control over an Android device to perform further malicious activity. According to researchers, this attack…
-
"Tainted Leaks: Researchers Unravel Cyber-Espionage Attacks"According to privacy researchers at the University of Toronto’s Citizen Lab, a cyber espionage campaign allegedly connected to Russia, has launched phishing attacks by distributing false emails that appear to be from Google. This attack has targeted more…
-
"8,000 Vulnerabilities Found in Pacemakers"White Scope, a security research firm, have discovered vulnerabilities within pacemakers. The examination of seven different pacemaker programmers, which are produced by four different manufacturers, reveal a shocking 8,000 vulnerabilities risen by…
-
"Ensuring the security of digital information"The task of protecting large bytes of sensitive digital data that is created, stored, transferred, and exchanged, is quite massive for computer technicians and researchers. The possibility of breaching security is immense as well as the…
-
“Two exciting breakthroughs in autonomous vehicle cybersecurity, though questions remain”As vehicles become more autonomous and intelligent through the advancement of computerized systems and sensors to provide safer mobility, the potential infiltration of such technology will always be present. Researchers at the University of Virginia and…
-
"UK surveillance law raises concerns security researchers could be 'deputised' by the state"The planned establishment of UK’s surveillance laws are igniting concerns among computer scientists and security researchers within the UK as it has been brought to attention, the potential enforced compliance to disclose any discoveries of…
-
“Cisco and IBM Security announce services and threat intelligence collaboration”Cisco and IBM have announced their collaboration to improve upon products, services, and threat intelligence. Integration between Cisco security solutions and IBM’s QRadar is expected to increase the advancement of network, endpoint, and cloud security,…
-
"How the Trump Budget Would Fund Cybersecurity"In a budget blueprint for the fiscal year of 2018, the Donald Trump administration outlines spending proposals expected to bolster the security of information systems. The budget proposes to allocate increased spending of $1.5 towards the improvement of…
-
SoS Musings #3 - Progress of Security Science on Hard ProblemsSoS Musings #3 Progress of Security Science on Hard Problems
-
Cyber Scene #10 - Cyber Insecurity: the Optic of Informed Outreach PragmatistsCyber Scene #10 Cyber Insecurity: the Optic of Informed Outreach Pragmatists
-
"Google's Fuzz Tester IDs Hundreds of Potential Open Source Security Flaws"Google has found hundreds of potential security vulnerabilities through its fuzz testing tool called OSS-Fuzz. This goal of this tool is to improve the security and strength of open source software. This article defines fuzz testing and discusses the…
-
"UK reportedly set to enforce anti-encryption proposals in wake of Manchester attack"Following the devastating terror attack in Manchester that took the lives of 22 people during a concert, British politicians are allegedly pursuing to enact anti-encryption orders upon technology firms within the UK. As technology firms currently apply…