News
  • "Cyberwarfare in Space: Satellites at Risk of Hacker Attacks"
    The London-based independent policy institute, Chatham House, recently released a research  paper, titled Cybersecurity of NATO's Space-based Strategic Assets. The paper calls for the North Atlantic Treaty Organization (NATO) and its member…
  • "Facebook Abused to Spread Remote Access Trojans Since 2014"
    In a new study, it was discovered that Facebook has been exploited to act as a distribution platform for a set of Remote Access Trojans (RATs) for years.  The aim of the operation has been to spread RATs including Houdini, Remcos, and SpyNote. So…
  • HotSoS 2019 Paper Synopses
      HotSoS 2019 Paper Synopses
  • "Personalized Medicine Software Vulnerability Uncovered by Sandia Researchers"
    Open source genome mapping software used in the personalization of medicine has been discovered by researchers at Sandia National Laboratories to be vulnerable to cyberattacks in which patients' genetic information can be altered. Personalized medicine…
  • "Keeping Children Safe in the ‘Internet of Things’ Age"
    Children need to be protected when they use programmable Internet computing devices such as the BBC micro:bit. The BBC micro:bit is a small easily-programmable device that could be used by children in the creation of digital technologies. Although such…
  • "Data Management Firm Exposed Client Info on Open Amazon S3 Buckets: Researchers"
    While a study was being conducted, it was discovered that data from Netflix, TD Bank, Ford and other companies was left exposed for an unknown period of time on publicly configured cloud storage buckets operated by data integration and management company…
  • "Avoid These Top Four Cybersecurity Mistakes"
    The Chief Security and Privacy Officer at Georgian Partners, Alex Manea, has pointed out four common mistakes made by CEOs in their approaches to mitigating the cybersecurity risks faced by their companies. According to Manea, CEOs often skip the…
  • "How Hackers Infiltrate Open Source Projects"
    Open source software included in most enterprises' critical applications is vulnerable to being infiltrated by hackers. According to security professionals, the nature of open source projects provides opportunities for hackers to insert malicious code,…
  • "Medtronic Recalls Vulnerable MiniMed Insulin Pumps"
    Medtronic is recalling its insulin pumps as a result of their vulnerability to being hijacked by hackers. The U.S. Food and Drug Administration (FDA) has warned of the danger of vulnerabilities in Medtronic's MiniMed insulin pumps, stating that the…
  • "The History of Cellular Network Security Doesn’t Bode Well for 5G"
    The 5G mobile communication standard is expected to bring improvements to users. However, there are still concerns surrounding whether 5G will fix security flaws in cell networks or not. Security researchers have already uncovered critical security flaws…
  • "Managing IoT Privacy, Cybersecurity Guidance Released by NIST"
    The National Institute of Standards and Technology (NIST) publication, NISTIR 8228, provides a guide that could be used by federal and private sector organizations in the management of IoT privacy and cybersecurity risks. The report is the first in a…
  • "Disruptive by Design: Intelligence Fusion Inoculates Against Cyber Threats"
    Cyber intelligence fusion is needed to improve upon the identification of cyber threats and the speed at which risks are mitigated by organizations. The fusion of such intelligence can also help organizations learn from cyber incidents in a…