News
-
"Using Physics to Keep Our Electrical Grid Safe"Computer security expert, Sean Peisert, and a team of researchers at Berkeley Lab are working to improve the security of the electrical grid, vehicles, manufacturing plants, and other cyberphysical systems in which physical components are merged with…
-
We're Surrounded by Billions of Internet-connected Devices. Can We Trust Them?BY ADAM PIORE ON 10/24/19 AT 12:24 PM EDT - NEWSWEEK MAGAZINE In 2009, just as consumers had begun to buy wifi-enabled thermostats and front-door cams and other early devices that now make up the "Internet of Things," computer scientist Ang…
-
"How Voice Assistants Follow Inaudible Commands"As the popularity of voice assistants continues to rise, concerns surrounding the security of speech recognition systems grow. Security researchers have discovered that it is possible for attackers to send malicious inaudible voice commands to speech…
-
"New Tool Determines Threats to Networked 3D Printers"The rise in the use of industrial Internet of Things (IoT) devices has changed the way factories operate in that devices such as networked 3D printers now connect with other machines. In addition, operators can control them remotely, which increases…
-
"Blacklisted Apps Increase 20%, Attackers Focus on Tax-Branded Key Terms"In a new study it has been found that in Q2 2019 there has been an increase of 20% in blacklisted apps, however the number of blacklisted apps in the Google Play Store decreased by a dramatic 59%. The percentage of blacklisted apps…
-
SoS Musings #30 - Improving Cybersecurity for AviationSoS Musings #30 Improving Cybersecurity for Aviation
-
"Mobile Users Targeted With Malware, Tracked by Advertisers"Mobile devices continue to be attractive targets for hackers as they are used everywhere. According to recent reports released by RiskIQ, Blackberry Cylance, and the Media Trust, there has been a significant rise in malicious apps being distributed via…
-
"Alexa and Google Home Phishing Apps Demonstrated by Researchers"SRL researchers built eight so-called “Smart Spies” and put them into app stores. SRL researchers were able to sneak in spyware into the applications, because third-party developers can extend the capabilities of Amazon Alexa…
-
IPv6 Comes of Age Despite Growing PainsIPv6 Comes of Age Despite Growing Pains Internet Protocol Version 6 is slowly being adopted as the replacement for version 4. Touted as a more secure protocol with increased address space, portability, and greater privacy, research…
-
"New Alliance Aims to Scupper Cyber-attacks on Operational Technology"The Operational Technology Cyber Security Alliance (OTCSA) is a new global alliance aimed at improving the security of OT used in critical and industrial infrastructure. OT refers to the hardware and software used to detect or make changes by monitoring…
-
Cyber Scene #37 - Letting Justice Prevail Another 230 YearsCyber Scene #37 - Letting Justice Prevail Another 230 Years