News
  • Winter 2019 Lablet Quarterly meeting focuses on Privacy
    Winter 2019 Lablet Quarterly meeting focuses on Privacy   The Winter 2019 Science of Security and Privacy (SoS) Quarterly Lablet meeting was held at the International Computer Science Institute (ICSI) in Berkeley, California on January 10-11 2019.…
  • 2019 National Intelligence Strategy
    The Office of the Director of National Intelligence (ODNI) released the 2019 National Intelligence Strategy. The strategy is broad, covering what needs to be done in the 17 IC elements, Cyber is an important part. Its major area 4.
  • "Ransomware in Decline, Report Confirms"
    According to a report recently released by Check Point, ransomware has been on the decline, while cryptomining malware has become more prevalent. The report highlights the decrease in the launch of ransomware against organizations, citing that only 4% of…
  • "Beware the Man in the Cloud: How to Protect Against a New Breed of Cyberattack"
    Man-in-the-cloud (MitC) attacks have become more frequent. The goal of an MitC attack is to access cloud accounts without having to attain compromised user credentials. These attacks occur through the exploitation of the OAuth synchronization token…
  • "Questioning the Effectiveness of Offensive Cyber Operations"
    The competition between rival states to gain power now significantly involves the use of cyber operations. Brandon Valeriano and Benjamin Jensen have ignited further discussion surrounding the effectiveness of offensive cyber operations in relation to…
  • "New Attacks Target Recent PHP Framework Vulnerability"
    A recently discovered code execution vulnerability contained by the ThinkPHP framework is being exploited by multiple threat actors to execute cryptominers, skimmers, and more. The vulnerability has also been found to be used by attackers to deliver a…
  • "Data Breaches Are Inevitable – Here’s How to Protect Yourself Anyway"
    As data breaches continue to increase in frequency and impact, it is important that people consider different ways in which they can protect their personal data. Cybersecurity researchers urge people to keep their software up-to-date with the…
  • "On Facebook and Twitter Your Privacy Is at Risk—Even If You Don't Have an Account"
    Findings of a new study conducted by a team of scientists from the University of Vermont and the University of Adelaide suggest that a person's identity and future activities can be predicted through the examination of messages and posts made by their…
  • "Nearly 773 Million Email Addresses Leaked, Spelling Trouble for People Who Re-Use Passwords"
    Security researcher, Troy Hunt, recently reported a massive data breach in which almost 773 million addresses and 22 million unique passwords have been exposed. The data that has been compromised was hosted on a cloud storage service, called MEGA.…
  • "Google Play Malware Used Phones’ Motion Sensors to Conceal Itself"
    Trend Micro researchers have discovered the use of motion sensors by malicious Google Play apps, BatterySaverMobi and Currency Converter, to evade detection. The motion-sensor input of infected devices is monitored by the malicious apps prior to…
  • "International Award-Winning Technology Protects the Power Grid by Hacking Would-Be Hackers"
    A system aimed at improving the security of the power grid against hackers has been developed by Milos Manic, professor of computer science and director of VCU’s Cybersecurity Center, in collaboration with the Idaho National Laboratory (INL). The…
  • "Cyberattacks Now Cost Businesses an Average of $1.1M"
    A new report by Radware highlights the rising average cost of a cyberattack faced by a business. According to the report, the average estimated cost of a cyberattack on a company has risen to $1.1 million. The report also brings further attention to the…