News
-
"No Keys to the Kingdom: New Single Sign-On Algorithm Provides Superior Privacy"Researchers from the Tokyo University of Science (TUS) have developed a new single sign-on (SSO) algorithm that prevents the disclosure of a user's identity and personal information to third parties. SSO systems provide users the option to access…
-
"iOS 14 Flags TikTok, 53 Other Apps Spying on iPhone Clipboards"iOS 14 beta version has been released. iOS 14 can identify applications that silently and automatically read anything a user copies into their mobile device's clipboard. The iOS 14 flagged TikTok, and 53 other apps for spying on iPhone…
-
"Hackers Hide Credit Card Stealing Script in Favicon Metadata"Malwarebytes recently reported malicious code insertion inside the Exchangeable Image File Format (EXIF) data of a favicon by hackers. A favicon is a small image used by web browsers to show a graphical representation of a website. Hackers are hiding…
-
"New Cybersecurity Standard for IoT Devices Established By ETSI"The European Telecommunications Standards Institute (ETSI) Technical Committee on Cybersecurity has revealed a new standard, titled ETSI EN 303 645, for the Internet of Things (IoT). It was developed through collaboration with members from academia,…
-
"US Cyber Command Says Foreign Hackers Will Most Likely Exploit New PAN-OS Security Bug"US Cyber Command is warning that foreign state-sponsored hacking groups will likely try to exploit a significant security bug disclosed today in PAN-OS. PAN-OS is the operating system running on firewalls and enterprise VPN appliances from Palo…
-
SoS Musings #38 - Critical Infrastructure CybersecuritySoS Musings #38 - Critical Infrastructure Cybersecurity
-
"New Vulnerabilities in Open Source Packages Down 20% Compared to Last Year"Researchers at Snyk have discovered that new vulnerabilities in open source packages are down 20 percent compared to last year, suggesting that the security of open source containers and packages are heading in a positive direction. Cross-site…
-
Cyber Scene #45 - Cyber Offense and Defense: The U.S. Election 3D ChessboardCyber Scene #45 - Cyber Offense and Defense: The U.S. Election 3D Chessboard
-
Cybersecurity Snapshots #7 - Is Online Voting a Good Idea?Cybersecurity Snapshots #7 - Is Online Voting a Good Idea?
-
Spotlight on Lablet Research #7 - Foundations of Cyber-Physical Systems ResilienceSpotlight on Lablet Research #7 - Project: Foundations of Cyber-Physical Systems Resilience
-
Pub Crawl #39Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"Cybercriminals Are Using IM Platforms as Marketplaces"Researchers at IntSight have discovered that cybercriminals are increasingly using IM platforms like Telegram, Discord, Jabber, WhatsApp, IRC, and others to advertise and sell their goods and services. The researchers believe that the reason why…