News
-
Pew Research Study on What the Public Knows about CybersecurityPew has released results from their survey on what the public knows about cybersecurity. As you can probably guess, the results were not stellar. (I took the survey, and got 10 out of 10 correct, putting me at the 1% threshold). The findings…
-
"Intelligence-Driven Supply Chain Resilience"As system environments and attacks become increasingly more sophisticated, security tactics must place more emphasis on detection and response, rather than the sole implementation of tools to prevent attackers from intrusion. This article discusses ways…
-
"New brain-inspired cybersecurity system detects 'bad apples' 100 times faster"Sandia Lab has collaborated with Lewis Rhodes Labs to develop a cybersecurity system that scans for very specific patterns instead of general indicators of an attack. The system in development is inspired by the complexity of the brain as the scanning…
-
"Security for multirobot systems"Researchers from MIT’s Computer Science and Artificial Intelligence Laboratory have discovered a new method to protecting communication networks of multirobots. Areas of research are beginning to expand further from communication, control algorithms, and…
-
Farmers Hacking TractorsIn a previous SoS meeting we learned there is challenge of securing tractors. A recent article published goes into much more detail about how American farmers are buying and installing Ukrainian Firmware for their John Deere tractors. URL: https…
-
Predatory Journals Recruite Fake EditorA research study published in Nature talks about the issue of predatory journals. These journals generally only try to make money from the academic community rather than giving good peer reviwed publications. The researchers created a fake person, Anna…
-
SoS Musings #1 - We are winning the battles but the war is elusive!SoS Musings #1 We are winning the battles but the war is elusive!
-
Pub Crawl #3Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"US-CERT Warns HTTPS Inspection May Degrade TLS Security"Research reveals that security is weakened when HTTPS inspection tools are ran in TLS traffic streams, which the Department of Homeland Security has now released a warning about. All HTTPS interception products pose potential dangers of man-in-the-middle…
-
"Machine learning can also aid the cyber enemy: NSA research head"Cyber attackers are starting to utilize machine learning technology to launch their attacks. Dr. Deborah Frincke, head of the NSA/CSS Research Directorate talks about potential scenarios in which a malicious user could manipulate the machine learning…
-
“Flaws in MAC address randomization implemented by vendors allow mobile tracking”Researchers at the U.S. Naval Academy have discovered a new attack method to manipulate the MAC address randomization system to track mobile devices. The purpose of this system is to protect the privacy of the user by broadcasting an arbitrary Wi-Fi MAC…
-
Cyber Scene #8 - Checking out, out of, and in with the U.S. Senate on Cyber SecurityCyber Scene March 17, 2017 Cyber Scene is intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of SoS Cybersecurity collaborat