News
  • "Cybersecurity Team at NAU Testing Ternary Computing to Secure Blockchain Technology for Cryptocurrency, Other Applications"
    A team of cybersecurity researchers at Northern Arizona University's (NAU) School of Informatics, Computing, and Cyber Systems, has been awarded a $125,000 grant by the U.S. Air Force Research Lab (AFRL) in support of work to strengthen the security of…
  • "A Powerful Spyware App Now Targets iPhone Owners"
    According to researchers at the mobile security firm, Lookout, the powerful surveillance app that was initially designed for Android devices, called Exodus, now targets iPhones. The developer of the malicious app was able to evade the Apple app store's…
  • "Watch SwRI Engineers Trick Object Detection System"
    Engineers at Southwest Research Institute have developed new adversarial learning techniques that can make objects invisible to object detection systems in which deep-learning algorithms are used. These techniques can also be used to deceive object…
  • "Tenable Discloses Verizon Fios Router Vulnerabilities"
    Any one with a Verizon Fios Quantum Gateway router, may be at risk of cyberattacks.  Tenable was able to find multiple vulnerabilities in the Verizon Fios Quantum Gateway (G1000) router. The impact of the vulnerabilities found is…
  • HotSoS 2019 Summary Report
      Hot Topics in the Science of Security: Symposium and Bootcamp (HotSoS) 2019
  • "It’s Disturbingly Easy to Trick AI into Doing Something Deadly"
    Recent studies conducted by artificial intelligence (AI) researchers emphasize the major impacts that adversarial machine learning (ML) can have on safety. Researchers have performed adversarial attacks on machine learning systems to demonstrate how easy…
  • "Making Scalable On-Chip Security Pervasive"
    The growth of Internet of Things (IoT) is accompanied by the increase in accessible devices and the number of complex chip designs needed for their operation. The rapid growth of IoT devices calls for the advancement of chip-level security. According to…
  • "Photons Trained for Optical Fiber Obstacle Course Will Deliver Stronger Cyber Security"
    The navigation of photons in networks of optical fibers will be improved through the use of a new technique demonstrated by researchers from the National University of Singapore (NUS) and Singtel, Asia's leading communications group. This new approach is…
  • "TrickBot Trojan seeks out weak human links in business to profit from the tax season"
    During tax season, there is usually an increase of Phishing attacks that occur.  Many Phishing attacks this year are focused on the business segment and deployment of the TrickBot Trojan.  The phishing schemes are designed to…
  • "Cybercriminals (Still) Using Facebook as a Black Market"
    Cisco's Talos security researchers have found that cybercriminals are using Facebook groups for the purpose of conducting illegal activities, including selling hacking services and sensitive information such as credit card numbers. Researchers were able…
  • "Researchers Uncover US-Based Malware Distribution Centre"
    Security researchers at Bromium have discovered the use of U.S.-based web servers to host and distribute 10 types of malware via large-scale phishing campaigns. According to researchers, these web servers are owned by FranTech Solutions, a bulletproof…
  • "What Is Shadow Mining and Why Is It a Security Threat?"
    The results of a survey recently conducted by Exabeam to which 150 cybersecurity professionals responded, indicate that most organizations lack awareness surrounding the threat of shadow mining and cryptojacking. The performance of shadow mining refers…