News
-
"Budget Request Emphasizes Cyber, Network Security Effort"According to the Trump administration's proposed budget for the fiscal year 2021, $18.8 billion will be spent on cybersecurity programs across the federal government. $9 billion is set aside for civilian agencies in support of improving network security…
-
"CISA Outlines Its Role in Helping States With Election Security"The Cybersecurity and Infrastructure Security Agency's (CISA) newly released strategic suggests that the agency will take on a facilitator role in the protection of the 2020 elections. CISA's coordination activities will touch on elections infrastructure…
-
"Hackers Can Peep Through This Smart Vacuum’s Camera, Research Shows"Researchers at the cybersecurity firm Checkmarx have discovered multiple security vulnerabilities in the internet-connected Trifo Ironpie robot vacuum. One of the most severe vulnerabilities contained by the device could allow attackers to get a view of…
-
"Apple’s iOS Pasteboard Leaks Location Data to Spy Apps"To many iOS users, pasteboard is simply part of the way to copy and paste data from one place to another. App developers called Mysk discovered a vulnerability in pasteboard, which can allow malicious apps to exploit it, and allow adversaries to gain…
-
"Lack of Cyber Confidence Across all Levels of Government, Survey Finds"SolarWinds recently released a report that highlights the results of a survey to which IT operations and security decisionmakers from federal, state, and local governments responded. According to the report, all levels of government lack organizational…
-
"Healthcare Providers Overconfident in Data Sharing Controls, Security"A survey conducted by Netwrix to which 1,045 global IT professionals from different sectors, including healthcare, responded. The purpose of the survey was to gain insight into how organizations handle data and to identify security shortfalls that could…
-
"By Exploiting an LTE Vulnerability, Attackers Can Impersonate Mobile Phone Users"Researchers at Ruhr Universitat Bochum found a vulnerability in the mobile communication standard LTE that could be exploited by attackers to impersonate mobile phone users. The abuse of this vulnerability could allow attackers to book services paid via…
-
"Tiny, Battery-Free ID Chip Can Help Combat Losses to Counterfeiting"According to a report from the Organization for Economic Co-operation and Development, the estimated value of counterfeit goods sold worldwide will reach $2 trillion in 2020. The counterfeiting of goods impacts the consumers and companies that build…
-
"New Sandboxing Approach in Web Browser Increases Security"A team of researchers from the University of Texas at Austin, the University of California San Diego, Stanford University and Mozilla, developed a new approach to securing web browsers. The approach, called the RLBox framework, moves some browser code…
-
"Pentagon Adopts New Ethical Principles for Using AI in War"The Pentagon's push to speed up its AI capabilities has caused many tech companies to fight over a $10 billion cloud computing contract known as the Joint Enterprise Defense Infrastructure or JEDI. Because of the Pentagon's push to speed up their use of…
-
"A Human-Machine Collaboration to Defend Against Cyberattacks"Cybersecurity analysts' tasks aimed at stopping cyberattacks before they cause any damage are data-heavy, thus increasing the adoption of machine learning (ML) and systems powered by artificial intelligence (AI) to help perform such tasks. However,…
-
NSA Seeking Proposals from Colleges on ScholarshipsNSA is looking for colleges and universities to apply to enter in Educational Partnership Agreements with NSA to increase participation of underrepresented minorities in STEM as part of its OnRamp II program. The deadline is April 10, 2020. Full details…