News
-
NSA Talks about Science of SecurityThe National Security Agency posted an article on NSA.gov that calls for nominations for the 5th annual paper competition and highlights some of the SoS accomplishments of the past year. Highlights include an accomplishment from each of the lablets, the…
-
“Researchers from Google, CTI Break SHA-1 Hash Encryption Function”Security researchers at Google and the CWI Institute have revealed that the Secure Hash Algorithm-1 (SHA-1) cryptographic function is still susceptible to being cracked by hackers. Researchers were able to mathematically generate identical SHA-1 hashes…
-
"Malware Lets a Drone Steal Data by Watching a Computer’s Blinking LED"Researchers at Ben-Gurion’s cybersecurity lab have discovered ways in which drones can steal data by scanning a computer’s LED indicator light. This hacking technique manages to bypass “air gap”, a security method designed to separate computers from the…
-
"Cloudflare 'Cloudbleed' Flaw Leaks User Data from Millions of Websites"Security researchers at Google have discovered a new malicious Cloudflare bug, Cloudbleed, which is responsible for leaking sensitive information of millions of people. This sensitive information includes private messages, passwords to online profiles…
-
"Cybersecurity of the power grid: A growing challenge"The U.S. electricity grid faces new challenges as cyberattacks become increasingly dangerous threats than ever before. In addition to protecting the grid against physical disasters, innovations and strategies for combating cyberattacks must also be…
-
"Amazon partners with state for new cybersecurity education pipeline"Amazon has partnered up with Virginia to improve cybersecurity education. Governor Terry McAuliffe has announced a new partnership between Amazon Web Services and the Virginia Cyber Range, which will help to maintain cloud infrastructure and build upon…
-
"Hackers can steal millions of cars after discovering huge flaw in manufacturer's connected car apps"Security researchers at Kaspersky Lab have discovered vulnerabilities in multiple car Android applications that would allow hackers to trace cars and unlock doors. These apps are revealed to have poor encryption and handling of sensitive information such…
-
"Microsoft Seeks Global Cybersecurity Accord"Microsoft wishes to develop a “Digital Geneva Convention” through the cooperation of governments around the world with the hopes of establishing international strategies and rules to combat cybersecurity threats and safeguard the internet for civilian…
-
"New Cybersecurity Certification First To Address Behavioural Analytics"CompTIA has announced a new cybersecurity certification, CompTIA Cybersecurity Analyst (CSA+). This certification is the first to incorporate behavioural analytics to detect and counteract cyber threats. Cyberattacks have become increasingly more complex…
-
"Southern Rail ticket kiosks allegedly open to cyber-attack"Security researchers have discovered security vulnerabilities in Southern Rail ticket kiosks that could easily be exploited by attackers. Although one spokesperson claims that the machines do not hold personal or confidential information, security…
-
"The Bright-Eyed Talking Doll That Just Might Be a Spy"The Federal Network Agency alarmed parents in Germany of the probable exploitation of their child's privacy through Cayla, the talking doll. It has been discovered that this doll could be hacked to steal and reveal personal information through…
-
"Closing The Cybersecurity Skills Gap With STEM"As the number of cybersecurity threats and attacks increase, the concern for the lack of skilled cybersecurity professionals deepens. Cyberattacks have become alarmingly more complex, which demands for highly skilled cybersecurity experts to…