News
-
"How Fog Computing Will Shape The Future Of IoT Applications And Cybersecurity"According to projections made by Markets and Markets, fog computing is predicted to expand at a significant rate during the next five years as a result of the rising demand for IoT device interconnectivity, machine communication, and real-time…
-
"Pentagon, Fearing Cyber Attack, Moves to Find Alternative Comms Network"As tensions rise between the U.S. and North Korea, the Pentagon is seeking to develop an alterative communications network in hopes of protecting the U.S. power grids from potential cyberattacks. Defense Advanced Research Project Agency (…
-
"Apple ransom highlights danger of credential stuffing"On April 7, a group of hackers by the name of “Turkish Crime Family” claimed to have breached Apple’s databases, demanding that Apple pay $75,000 to prevent the leakage of millions of user credentials. Though Apple has stated that their…
-
"Bastille warns radio-based hacks pose risk to national infrastructure"Bastille, leader in enterprise threat detection via software-defined radio, is trying to bring more attention to the potential rise in radio frequency hacking. A recent case sparks concern as a hack was performed through radio frequencies of the Dallas…
-
"Automation Advancement: The Road to Emergent Security AI?"The increasing emergence of big data and IoT is cultivating more ideas for organizations as well as raising concerns about the security of network services and data. ABI Research predicts that security automation could significantly improve security…
-
"Attackers caught defacing sites with difficult to spot techniques"Sucuri researchers have discovered another rush of attacks targeting and vandalizing websites through the use of images, applying a technique that complicates the process of detection as well as the identification of the compromised site as…
-
"Inmates hid self-built PCs in the ceiling and connected them to prison network"Ohio Inspector General’s Office has released a report on an investigation that reveals the unauthorized access to Marion Correctional Institution’s network by two prison inmates, through the use of self-built PCs hidden in the ceiling of a…
-
HotSoS 2017 - Differential Privacy, CPS, and complex navigation of security issues - Highlighted TopicsDifferential Privacy, CPS, and complex navigation of security issues at HotSoS 2017
-
"Securing Driverless Cars From Hackers Is Hard. Ask the Ex-Uber Guy Who Protects Them"Security researchers, Charlie Miller and Chris Valasek, performed a demonstration two years ago that revealed the potential remote hacking of a vehicle through its internet connection to disable driving functionality. Since then, cybersecurity concerns…
-
"How criminals can steal your PIN by tracking the motion of your phone"Cyber researchers at Newcastle University have discovered that it is possible for hackers to crack PINs and passwords by using malicious websites and apps to spy on users just based on the motion of 25 different standard sensors integrated into most…
-
"Outer-Space Hacking a Top Concern for NASA’s Cybersecurity Chief"As NASA scientists continue to transmit and extract data to and from their Swift and Fermi satellites for further space examination, cybersecurity has become a greater issue. Projects have outlasted the expected life expectancy by over a decade,…
-
Science of Security 2016 Annual ReportThe Science of Security Annual Report details the progress of the activities in the Science of Security research initiative. The most recent annual report, published in April 2017, highlights the work done in Fiscal Year 2016. For more information about…