News
-
"Verizon Data Breach Digest Triangulates Humanity Inside Security"Verizon has released a comprehensive data breach report that covers a wide-range of attack scenarios. This report identifies potential targets, characteristics, patterns, and complexity measurements of different attacks that may be launched at a system.…
-
"IoT Cybersecurity Alliance to focus on security challenges"AT&T, IBM, and Nokia has teamed up to combat security challenges, particularly in relation to IoT cybersecurity. A survey conducted in 2016 revealed that 58% of companies lacked confidence in the security they put in place to protect their devices…
-
"Windows Trojan hacks into embedded devices to install Mirai"It has been discovered that embedded devices are also susceptible to being hacked with Windows and Android malware. Mirai is a malware program that targets Linux-based devices such as IP cameras and digital video recorders to launch DDoS attacks. This…
-
"Memory-Based Malware Uses PowerShell Scripts, Pentest Tools to Evade Detection"Researchers at Kaspersky Lab have discovered a memory-based malware that bypasses detection via PowerShell scripts ran within the Windows registry and penetration testing tools. As of right now, this malware has attacked 140 organizations within 40…
-
"The Fight Over Email Privacy Moves to the Senate"The US House of Representatives has passed the Email Privacy Act (H.R. 387). This act would require law enforcement to attain a search warrant before having access to private emails and other documents held with cloud storage providers such as…
-
"Protecting Smart Grids and Critical Infrastructure Are Top Concerns for Energy and Utility Firms"As the energy market relies on technological innovations such as machine learning to increase efficiency, the concern for cybersecurity deepens. Although advancements such as smart electricity grids and digital oil fields offer increased…
-
"Quantum Computing Paranoia Creates a New Industry"Although research and development of quantum computers is still in progress, security companies are already anticipating breaks in encryptions due to quantum computing capabilities. The National Institute of Standards and Technology suggests the…
-
Synopses of Presentations: Quarterly Lablet meeting NCSU 1-2 Feb 2017The winter 2016 quarterly Science of Security (SoS) Lablet meeting was held at North Carolina State University on February 1 and 2, 2017. In addition to speakers from the Lablets and NSA, corporate speakers provided insights into the problems of…
-
Researchers, Industry, NSA meet, discuss Privacy, Artificial IntelligenceRaleigh, NC February 2, 2017 The winter 2016 quarterly Science of Security (SoS) Lablet meeting, sponsored by NSA, was hosted at North Carolina State University on February 1 and 2, 2017. Laurie Williams and Munindar Singh, Principle…
-
"Android Phones Still Open To WAP Attacks"Researchers at Context Information Security have discovered that Android phones are still susceptible to SMS-based attacks. Such attacks can disable functionality and invite other attacks such as ransomware. These vulnerabilities are suspected to…
-
Cards Promoting ValidityNormally, blog posts about a super bowl commerial would not rate as interesting for the Science of Security community. However; one did.
-
"Cloud Storage The New Favorite Target Of Phishing Attacks"According to recent security reports released by PhishLabs, phishing was the most common attack vector in 2016. Reports on phishing trends also reveal that cloud storage service providers such as Google and DropBox have increasingly been targeted over…