News
  • Open for Nominations!
    The 7th Annual Best Scientific Cybersecurity Paper Competition is now open for nominations. This year's nominating period runs through midnight on March 30, 2019. We look forward to receiving your nominations.
  • "Leveraging AI and Automation for Successful DevSecOps"
    Ten ways in which organizations can take full advantage of AI and automation in the practice of DevSecOps have been highlighted. Organizations are encouraged to automate their quality gates, compliance requirements, and more. This article continues to…
  • "Hackers Are Making Their Attacks Look like They Came from the Chinese Government"
    According to threat intelligence experts, there has been an increase in the use of false-flag operations by hackers to make cyberattacks appear to have been launched by Chinese hackers. As publicly available tools are often used in the attack operations…
  • "Computer Chip Vulnerabilities Discovered"
    Researchers from Washington State University have discovered vulnerabilities in the communications system of high-performance computer chips that could cause modern electronics to malfunction. These vulnerabilities were uncovered through the…
  • "Shamoon Malware Destroys Data at Italian Oil and Gas Company"
    The notorious data-wiping malware known as Shamoon has emerged again to target an Italian oil and gas company by the name of Saipem. The new variant of the Shamoon malware crippled ten percent of Saipem’s computer systems, most of which are located in…
  • "Telegram, WhatsApp and Signal Open to Side-Channel Attacks"
    A warning has been issued by Cisco's Talos security research group pertaining to the insecurity of encrypted messaging apps Telegram, WhatsApp, and Signal. According to researchers, these apps that have been claimed to encrypt messages in transit are…
  • "Cryptography Failure Leads to Easy Hacking for Playstation Classic"
    The recently released PlayStation Classic has already been found to be vulnerable to a hack that could allow non-PlayStation software and more PlayStation games to be added to the plug-and-play device. This hack is possible as a result of weak…
  • "Protecting Our Digital Heritage in the Age of Cyber Threats"
    The Australian Strategic Policy Institute (ASPI) recently released a report, which emphasizes the importance of protecting national records that hold information pertaining to births, deaths, taxes, marriages, and more, from being hacked. If such records…
  • NYT Article on Apps Sharing Location Data
    New York Times has an investigative reporting article on the location sharing monitoring and sharing of data with mobile apps. It shows the use and detailed nature of the data. https://www.nytimes.com/interactive/2018/12/10/business/location-data-…
  • "Bug Bounty Hackers Bill Introduced into the U.S. Senate"
    A bill, called the Public-Private Cybersecurity Cooperation Act, has been proposed by a bipartisan pair of U.S. Senators. The aim of the bill is to require the creation of a vulnerability disclosure program by the Department of Homeland Security. The…
  • "Kubernetes Vulnerability Hits Top of Severity Scale"
    A major security vulnerability was recently discovered to be contained by the popular cloud container orchestration system, Kubernetes. The vulnerability could be exploited by authorized and unauthorized users to escalate privileges. This article…
  • "The Privacy Risks of Compiling Mobility Data"
    MIT researchers have conducted a new study that reveals the risks posed by the practice of compiling anonymized data consisting of location stamps to the privacy of users. Data from mobile phone records, Twitter accounts, and more, can be …