News
-
"New Technique Uses Power Anomalies to ID Malware in Embedded Systems"Using a new technique developed by researchers from North Carolina State University and the University of Texas at Austin, malware can be detected in embedded systems. Embedded systems in voice-activated virtual assistants, industrial control systems…
-
"Embracing Creativity to Improve Cyber-Readiness"Security teams are encouraged to be more creative in their responses to cyberthreats as cyberattacks continue to grow in complexity and frequency. In addition to focusing on employee access, restriction, and controls, to bolster the security of…
-
"Industrial Control Systems Security: To Test or Not to Test?"The increased connectivity of industrial control systems has made such systems more vulnerable to cyberattacks, which could have serious implications in regard to the security and well-being of the communities that rely on them. According to IBM's X-…
-
"DNSpionage Actors Adjust Tactics, Debut New Remote Administration Tool"Threat actors behind the launch of the DNSpionage DNS hijacking campaign have modified their tactics, techniques, and procedures (TTPs), adding a new reconnaissance stage. They have also introduced a new remote administration tool, called Karkoff. The…
-
"Researchers Develop AI Tool Better Able to Identify Bad Data"The HoloClean tool detects bad data and corrects errors prior to processing the data. The new system also can automatically generate bad examples, without tainting source data. This process allows the system to learn to identify and…
-
SoS Musings #25 - Cloudy with a Chance of Data HaulsSoS Musings #25 Cloudy with a Chance of Data Hauls
-
"Computer Scientists Design Way to Close 'Backdoors' in AI-Based Security Systems"Security researchers at the University of Chicago are developing methods to defend against backdoor attacks in artificial neural network security systems. One technique that will be presented by researchers at the 2019 IEEE Symposium on Security and…
-
"Password '123456' Used by 23.2 Million Users Worldwide"According to a report released by the National Cyber Security Centre (NCSC), significantly weak passwords such as "123456" and "ashley" have been used by 23.2 million users. This discovery was made from the examination of global cyber breaches. In…
-
"Academics Hide Humans from Surveillance Cameras with 2D Prints"Researchers from the Catholic University in Leuven (KU Leuven) have developed a method that could be used to make humans invisible to AI-powered surveillance camera systems. The method involves the printing and strategic placement of 2D images on to…
-
"Facebook Marketplace Flaw Revealed Seller's Exact Location"The JSON JavaScript object notation for advertisements that had been created with the Facebook mobile app were not approximate. The listing included not only the full postcode, but also the latitude and longitude coordinates of the seller.…
-
"There’s a Massive Cybersecurity Job Gap – We Should Fill It by Employing Hackers"The growing frequency and sophistication of cyberattacks calls for the increase in cybersecurity professionals. A study conducted by researchers at Bournemouth University suggests the filling of the cybersecurity workforce gap with hackers. Findings of…
-
"A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions"Security researchers with the firm, Independent Security Evaluators, have discovered the storing of cryptocurrency with easily guessable private keys and the exploitation of these keys by a blockchain bandit to steal the cryptocurrency, Ethereum.…