News
  • "'Hack the Air Force' Bug Hunting Challenge Uncovers 120 Flaws in Websites and Services"
    A bug bounty program launched by the U.S. Department of Defense (DoD), called Hack the Air Force, allowed hackers to find and report security vulnerabilities contained by public-facing Air Force websites and services. Hackers that participated in the…
  • "Attackers Are Using Cloud Services to Mask Attack Origin and Build False Trust"
    According to a report released by Menlo Security, the padlock in a browser’s URL bar gives users a false sense of security as cloud hosting services are being used by attackers to host malware droppers. The use of this tactic allows attackers to hide the…
  • "Anti-Hacker Team Develops Data Sharing Scheme for Cloud Storage"
    Data security continues to be a challenge in cloud computing. An approach to improving the security of information in cloud computing environments has been suggested by scientists from the Laboratory of Problem-Oriented Cloud Computing at South Ural…
  • "How a Personality Trait Puts You at Risk for Cybercrime"
    Researchers at Michigan State University conducted a study that examines the behaviors that could lead people to becoming victims of cybercrime. According to the study, those who lack self-control are more likely to fall victim to cyberattacks such as…
  • "Better Security Achieved with Randomly Generating Biological Encryption Keys"
    A team of engineers at Penn State University has proposed a way in which the security of data could be improved. The engineers suggest the random generation of encryption keys through the use of living cells. Such encryption keys would be impossible…
  • "Cyber-Security Standards for Connected and Automated Vehicles Published"
    The British Standards Institute has published a new cybersecurity standard for connected and automated cars. This standard will help the car industry in the improvement and preservation of security for connected and automated vehicles. This…
  • "Remote Firmware Attack Renders Servers Unbootable"
    Security researchers from Eclypsium have demonstrated a way in which servers could be bricked by adversaries. The attack involves the exploitation of baseboard managements controllers (BMCs), which are specialized microcontrollers that are implemented…
  • "New Cyber Readiness Program Launched for SMBs"
    Small and medium business (SMBs) that may lack the resources to prioritize cybersecurity will be aided by the Cyber Readiness Program, which has been launched by the Cyber Readiness Institute.  Improving the cybersecurity of SMBs is important as…
  • "How an Immune-System Model Mitigates Risks from Cyber Attacks on the Power Grid"
    GE Global researchers are working on developing the world's first industrial immune system. The industrial immune system will identify, find, and neutralize cyber threats faced by critical power systems and assets. This article continues to discuss the…
  • "Universities Get Schooled by Hackers"
    Recent reports point out the growing complexity of cyberattacks faced by colleges and universities. Such institutions are often targeted by hackers as a result of the large amounts of personal information they store and their lack of adequate security.…
  • "Can’t Hack? You Can Buy the Tools on the Dark Web Instead"
    A report recently released by Deloitte brings further attention to the dark web in which tools and services are available for cybercriminals to purchase and use for the performance of malicious cyber activities. The report emphasizes that one does not…
  • "Bolstering Cyber-Physical Systems Security"
    Researchers from Missouri S&T have been awarded a National Science Foundation research grant of almost $1 million in support of developing better protections for a variety of complex cyber-physical systems (CPS) such as electric grids, self-driving…