News
-
"Grad Student Works With Research Team to Strengthen Nonprofits’ Cybersecurity"Anivesh Sinha, a master's student in Information Science at Penn State Great Valley, is collaborating with a team of faculty and other students to conduct a Presidential Public Impact Research Project to help Pennsylvania nonprofit organizations improv
-
"Security in Quantum Computing"Researchers at the National Center for Supercomputing Applications (NCSA), a unit of the University of Illinois Urbana-Champaign, are addressing the issue of practical quantum computers breaking classical encryption before it becomes an actual problem.
-
"Health Monitoring Devices at Risk of Being Hacked, Study Shows"Researchers at Charles Darwin University (CDU) hacked into an oximeter, a smartwatch, and a smart peak flow meter to explore the potential risks and vulnerabilities of these Internet-connected medical devices. According to the study's co-author, Dr.
-
"The Sherlock Holmes of AI"Georgia Tech developed a postmortem cybersecurity forensic tool named "AI Psychiatry" (AiP) that uses Artificial Intelligence (AI) to recover the original Deep Learning (DL) models a compromised machine, such as a self-driving car, runs on and determin
-
"Cybersecurity and Privacy Institute Secures $1.5M in Funding"Researchers at the University of Waterloo's Cybersecurity and Privacy Institute (CPI) will receive over $1.5 million in funding from the National Cybersecurity Consortium (NCC) to advance digital security in Canada.
-
"CodeHoppers Returns With Aim to Inspire Girls to Learn More About Cyber"The student-led program "CodeHoppers," sponsored by Augusta University's (AU) School of Computer and Cyber Sciences, is returning.
-
"50% of Financial Orgs Have High-Severity Security Flaws in Their Apps"According to security researchers at Veracode, security debt, flaws that remain unfixed for longer than a year, exists in 76% of organizations in the financial services sector, with 50% of organizations carrying critical security debt.
-
"Lottie-Player Supply Chain Attack Targets Cryptocurrency Wallets"LottieFiles has recently confirmed that its Lottie-Player software has been compromised in a supply chain attack aimed at stealing cryptocurrency from victims. LottieFiles’ Lottie-Player is widely used for embedding and playing Lottie animati
-
"DDoS Site Dstat.cc Seized And Two Suspects Arrested in Germany"The Dstat.cc DDoS review platform has recently been seized by law enforcement, and two suspects have been arrested after the service helped fuel distributed denial-of-service attacks for years.
-
"Canadian Government Data Stolen By Chinese Hackers"The Canadian Centre for Cyber Security recently announced that at least 20 Canadian government networks have been compromised by Chinese state-sponsored threat actors, who have maintained access over the past four years to steal valuable data.
-
"FakeCall Android Trojan Evolves with New Evasion Tactics and Expanded Espionage Capabilities"New research shows that the "FakeCall" Android banking trojan, also known as "Fakecalls," has grown more sophisticated in evasion and espionage.