News
-
"New Cryptography Method Promising Perfect Secrecy Is Met With Skepticism"A team of researchers from King Abdullah University of Science and Technology, the University of St. Andrews, and the Center for Unconventional Processes of Sciences claims to have demonstrated a "perfect secrecy cryptography system" that is resistant to…
-
"Mac Malware Threats Are Now Outpacing Attacks on Windows PCs"Researchers that work for a cybersecurity company Malwarebytes analyzed a year of data on cyberattacks their customers were affected with and found that malicious activity and malware attacks targeting Macs rose significantly over the past year. In…
-
"Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems"A formal risk framework aimed at improving the development of secure machine learning (ML) systems has been developed by researchers at the Berryville Institute of Machine Learning (BIML). The BIML researchers conducted an architectural risk analysis of…
-
"New Legislation Would Help Local Gov with Cybersecurity"The recently introduced State and Local Cybersecurity Improvement Act aims to address cybersecurity threats faced by systems used by state, local, and territorial governments in the US. The legislation would establish a $400 million grant program at the…
-
"Hackers Could Shut Down Satellites – or Turn Them into Weapons"Amazon, U.K.-based OneWeb, and other companies are racing to put thousands of satellites in space. These satellites are expected to improve environmental monitoring, global navigation systems, and access to the internet in remote areas of the world.…
-
"Will Weak Passwords Doom the Internet of Things (IoT)?"Weak passwords are expected to be the downfall of the Internet of Things (IoT) security. Security experts have already observed an increase in attacks against IoT devices in which weak passwords were exploited. For example, in 2019, poor password…
-
"Study Unveils Security Vulnerabilities in EEG-Based Brain-Computer Interfaces"Researchers at Huazhong University of Science and Technology did a study on the security of electroencephalography (EEG)-based brain-computer interfaces (BCIs). Breakthroughs in machine learning (ML) have led to the advancement of BCI spellers, which…
-
"MIT Researchers Identify Security Vulnerabilities in Voting App"There has been increased interest in using mobile technology and the internet to improve access to voting. However, computer security experts warn of the vulnerability of mobile voting applications to hacking. Researchers at MIT did an analysis of a…
-
"Security Pros Anticipate Automation Will Reduce IT Security Headcount, but not Replace Human Expertise"In a new survey conducted by DomainTools and Ponenom Institue, they found that many companies (77 percent) continue to use or plan to use automation in IT in the next three years. 51 percent of IT respondents believe that automation will decrease…
-
"Inside the Mind of a Hacker"Researchers from the University at Buffalo School of Management did a study to find out which personality traits led people to become black, white or gray hat hackers. The researchers surveyed 439 college sophomores and juniors in computer science and…
-
"Social Engineering Scam Hits Washington County Government"Benton County, a county in the U.S. state of Washington, fell victim to a social engineering phishing scam in which thieves attempted to steal money. Further investigation revealed that the cybercriminals behind this scam are in India. The thieves…
-
"Unsecured Estee Lauder Database Exposed 440 Million Records"Researchers have discovered an unsecured database belonging to cosmetic giant Estée Lauder, which exposed over 440 million company records. The database, is hosted on the company's Microsoft Azure cloud platform. Since discovering the unsecure database,…