News
-
"Critical Bug in Siemens SIMATIC PLCs Could Let Attackers Steal Cryptographic Keys"A flaw in the Siemens SIMATIC Programmable Logic Controller (PLC) can be used to retrieve the hard-coded, global private cryptographic keys and seize control over the devices. According to industrial cybersecurity firm Claroty, an attacker can use these…
-
"White House is Planning to Develop IoT Device Cyber Labeling Program"The White House plans to develop a product labeling system to inform customers about the security risks that connected devices pose. In an October 11 fact sheet, the White House announced plans to hold a conference with interested parties to discuss a…
-
"Protecting Identities of Panelists in Market Research"According to a study conducted by researchers at Cornell SC Johnson College of Business, it is highly likely that the identity and other sensitive information of a survey participant can be traced back to the individual. When organizations release or…
-
"How Dark Patterns Manipulate Internet Users Every Day"According to Dr. Arianna Rossi, a research scientist in the Socio-technical Cybersecurity (IRiSC) research group at the University of Luxembourg's Interdisciplinary Centre for Security, Reliability, and Trust (SnT), the concept of dark patterns extends…
-
"New Method Makes Digital Services Safer for the User"Services are increasingly becoming digital as many people now do their banking, grocery shopping, and ticket booking online. Many people rely entirely on digital services in their personal and professional lives. As a result of societal digitization,…
-
"Bolstering 5G Security for Ultra-Sensitive Applications"A new National Science Foundation (NSF)-funded project led by University of Michigan-Dearborn's Junaid Farooq, assistant professor of Electrical and Computer Engineering, may allow the military to use commercial 5G networks without fear of being…
-
"AT&T Rolls Out New Cybersecurity Feature to Safeguard Text Messages"AT&T has recently rolled out a new cybersecurity feature to safeguard text messages. Researchers at AT&T stated that for the first time, cyber scammers have started to use text messages more than phone calls to entrap fraud victims. …
-
"Several Horner PLC Software Vulnerabilities Allow Code Execution via Malicious Font Files"A cybersecurity researcher named Micahel Heinzl has recently discovered a total of seven high-severity remote code execution vulnerabilities in Horner Automation’s Cscape product, and they can all be exploited using malicious font files. Horner…
-
"Award-Winning Research Paves the Way for Provably-Safe Sandboxing Using WebAssembly"In the realm of computer programming, developers face the challenge of using untrusted code safely. For example, libraries and frameworks help coders avoid tedious and redundant work, but using code from unverified sources can be dangerous without the…
-
"Linn-Mar School Staff Information Compromised in Cybersecurity Breach"Recently Linn-Mar Community School District discovered that staff names and Social Security numbers may have been stolen in a cybersecurity breach over the summer. The district identified unusual activity on its systems around July 31st. The…
-
"High-Value Targets: String of Aussie Telco Breaches Continues"A third Australian telecommunications company has now disclosed that it was breached. This time, it is Dialog, a provider of information technology services with a sizable market share of Australian customers in both the public and private sectors. This…
-
"Nobel-Winning Quantum Weirdness Undergirds an Emerging High-Tech Industry, Promising Better Ways of Encrypting Communications and Imaging Your Body"Unhackable communications devices, high-precision GPS, and high-resolution medical imaging all rely on the non-intuitive quantum phenomenon of entanglement. Two quantum particles, such as atoms or photons, can become entangled in which a property of one…