News
  • NSA Launches Latest Codebreaker Challenge
    By Betsy Stein NSA/CSS Communications Officer FORT MEADE, MD, Sept. 20, 2019 — Are you a U.S. undergraduate or graduate student interested in attempting to crack a cyber-challenge similar to those that regularly threaten national security? Then sign…
  • NIST Releases Draft Security Feature Recommendations for IoT Devices
    NIST Releases Draft Security Feature Recommendations for IoT Devices "Core Baseline" guide offers practical advice for using everyday items that link to computer networks. August 01, 2019
  • "Advanced Hackers Are Infecting IT Providers in Hopes of Hitting Their Customers"
    Researchers with the Symantec Attack Investigation Team recently discovered a new hacking group, called Tortoiseshell, which has infected 11 IT providers. According to researchers, the previously undocumented group uses custom and off-the-shelf hacking…
  • "Instagram Phish Poses as Copyright Infringement Warning – Don’t Click!"
    It has been discovered that there is a new phishing attempt going around that, tries to convince Instagram users, that they have gone against copyright laws.  As in the previous case of Instagram phishing, the crooks are using a free .CF…
  • " Google Calendar Privacy Concerns Raised"
    A misconfiguration in a Google Calendar function that allows Google to index calendars, raises serious privacy concerns. It was discovered that over 8,000 Google calendars were publicly accessible and searchable using the Google…
  • "What to Expect From the NSA’s New Cyber Directorate"
    The National Security Agency (NSA) created a new unit aimed at defending the U.S. against foreign adversaries in cyberspace, which will go into effect on October 1, 2019. NSA's Cybersecurity Directorate will be under the leadership of Anne Neuberger who…
  • "Instagram Fixed After Researcher Finds Way to Link Account Info to PII"
    Instagram’s contact importer feature contained a vulnerability that could have allowed malicious actors to access account details and phone numbers using a brute-force algorithm and a network of bots. The information gathered through the exploitation of…
  • "Researchers Invent Cryptocurrency Wallet That Eliminates 'Entire Classes' of Vulnerabilities"
    Researchers from the Massachusetts Institute of Technology’s Computer Science and Artificial Intelligence Laboratory (MIT CSAIL) recently published a paper in which they present details on a new form of hardware wallet that they invented. Hardware…
  • "How Hackers Get Stuck In HADES"
    Sandia National Laboratory's High-fidelity Adaptive Deception and Emulation System (HADES) applies deceptive cybersecurity tactics to defend systems against hackers. HADES lures hackers into a simulated virtual environment in which defenders can track…
  • "Cyber-Security Incident at US Power Grid Entity Linked to Unpatched Firewalls"
    A recent report published by the North American Electric Reliability Corporation (NERC) discusses the cause of a cybersecurity incident that occurred earlier this year in which a U.S. power grid was impacted. According to the report, the incident only…
  • "How Data Breaches Are Hurting Small Businesses"
    Bank of America Merchant Services released a report, which discusses how data breaches impact small businesses and how SMBs handle problems related to such incidents. A survey of consumers and small businesses found that 21 percent of SMBs experienced a…
  • NSA-approved cybersecurity law and policy course now available online
    NSA-approved cybersecurity law and policy course now available online Cyber Scoop Shannon Vavra August 27th, 2019 Anyone who is interested in cybersecurity law and policy can now take an online course that was partly shaped by National Security…