News
-
"Watch SwRI Engineers Trick Object Detection System"Engineers at Southwest Research Institute have developed new adversarial learning techniques that can make objects invisible to object detection systems in which deep-learning algorithms are used. These techniques can also be used to deceive object…
-
"Tenable Discloses Verizon Fios Router Vulnerabilities"Any one with a Verizon Fios Quantum Gateway router, may be at risk of cyberattacks. Tenable was able to find multiple vulnerabilities in the Verizon Fios Quantum Gateway (G1000) router. The impact of the vulnerabilities found is…
-
HotSoS 2019 Summary ReportHot Topics in the Science of Security: Symposium and Bootcamp (HotSoS) 2019
-
"It’s Disturbingly Easy to Trick AI into Doing Something Deadly"Recent studies conducted by artificial intelligence (AI) researchers emphasize the major impacts that adversarial machine learning (ML) can have on safety. Researchers have performed adversarial attacks on machine learning systems to demonstrate how easy…
-
"Making Scalable On-Chip Security Pervasive"The growth of Internet of Things (IoT) is accompanied by the increase in accessible devices and the number of complex chip designs needed for their operation. The rapid growth of IoT devices calls for the advancement of chip-level security. According to…
-
"Photons Trained for Optical Fiber Obstacle Course Will Deliver Stronger Cyber Security"The navigation of photons in networks of optical fibers will be improved through the use of a new technique demonstrated by researchers from the National University of Singapore (NUS) and Singtel, Asia's leading communications group. This new approach is…
-
"TrickBot Trojan seeks out weak human links in business to profit from the tax season"During tax season, there is usually an increase of Phishing attacks that occur. Many Phishing attacks this year are focused on the business segment and deployment of the TrickBot Trojan. The phishing schemes are designed to…
-
"Cybercriminals (Still) Using Facebook as a Black Market"Cisco's Talos security researchers have found that cybercriminals are using Facebook groups for the purpose of conducting illegal activities, including selling hacking services and sensitive information such as credit card numbers. Researchers were able…
-
"Researchers Uncover US-Based Malware Distribution Centre"Security researchers at Bromium have discovered the use of U.S.-based web servers to host and distribute 10 types of malware via large-scale phishing campaigns. According to researchers, these web servers are owned by FranTech Solutions, a bulletproof…
-
"What Is Shadow Mining and Why Is It a Security Threat?"The results of a survey recently conducted by Exabeam to which 150 cybersecurity professionals responded, indicate that most organizations lack awareness surrounding the threat of shadow mining and cryptojacking. The performance of shadow mining refers…
-
HoTSoS 2019 Best Paper and Poster AwardsThe Hot Topics in Science of Security (HoTSoS) Best Paper Award recognizes the paper that exhibits outstanding achievement in science. Papers are selected by the HoTSoS Program Committee. The winning paper is automatically nomination into the…
-
"Xiaomi's Phones Had a Security Flaw Preinstalled on Millions of Devices"Smartphones made by Xiaomi, a Chinese technology company, were discovered by researchers from Check Point to contain a security vulnerability that could allow hackers to steal data, install tracking apps, and more. According to researchers, the…