News
  • SoS Musings #22 - Exploring the Art of Deception in Cybersecurity
    SoS Musings #22 Exploring the Art of Deception in Cybersecurity 
  • Cyber Scene #29 - Geopolitics, Trade and Tech: No "Global-exit"
    Cyber Scene #29 Geopolitics, Trade and Tech: No "Global-exit"
  • "New Mac Malware Uses Steganography to Sneak Into Computers"
    A strain of new Mac malware, called VeryMal, has recently emerged and it is being spread through the use of a technique known as steganography, which is increasingly being used by hackers. Steganography is a method in which data…
  • "Phishing Attacks Continue to Rise, Proofpoint Reports"
    Proofpoint recently released a report, called State of the Phish, which highlights the continuing rise in phishing attacks. The report also brings further attention to employees' lack of awareness and understanding surrounding cybersecurity terms…
  • "Patented Technology Cloaks Location on Mobile Devices to Protect Privacy"
    Technology aimed at preserving privacy while using location-based apps and services on mobile devices has been developed by a researcher at Iowa State University. The location-cloaking technology is valuable as location-based information can be used by…
  • "265 Researchers Take Down 100,000 Malware Distribution Websites"
    Almost 100,000 websites, used in the distribution of malware, were taken down as a result of the efforts of 265 security researchers in a project, called URLhaus. Security researchers submitted an average of 300 abuse reports daily to companies…
  • "Security Researchers Detail Serious 'Anatova' Ransomware"
    A new ransomware family, called Anatova, has been discovered by security researchers at McAfee LLC. Anatova is considered to be serious in that it is able to quickly change in relation to how it propagates and avoids detection. This…
  • "Multi-Vector Attacks Target Cloud-Hosted Technologies"
    According to a report released by security researchers from Securonix, there has been a rise in the launch of multi-vector and multi-platform automated attacks targeting cloud-hosted services, which have been found to install cryptocurrency-mining…
  • "DHS Warns Federal Agencies of DNS Hijacking Attacks"
    The U.S. Department of Homeland Security (DHS) has issued an alert pertaining to the increase in DNS hijacking attacks targeting federal agencies. DNS hijacking is an attack in which DNS records are modified so that web and mail traffic are maliciously…
  • Winter 2019 Lablet Quarterly meeting focuses on Privacy
    Winter 2019 Lablet Quarterly meeting focuses on Privacy   The Winter 2019 Science of Security and Privacy (SoS) Quarterly Lablet meeting was held at the International Computer Science Institute (ICSI) in Berkeley, California on January 10-11 2019.…
  • 2019 National Intelligence Strategy
    The Office of the Director of National Intelligence (ODNI) released the 2019 National Intelligence Strategy. The strategy is broad, covering what needs to be done in the 17 IC elements, Cyber is an important part. Its major area 4.
  • "Ransomware in Decline, Report Confirms"
    According to a report recently released by Check Point, ransomware has been on the decline, while cryptomining malware has become more prevalent. The report highlights the decrease in the launch of ransomware against organizations, citing that only 4% of…