News
  • "Iranian Threat Group Targets Universities"
    An Iranian cyber threat group known as Cobalt Dickens has been linked to the launch of a credentials theft campaign targeting universities. Security researchers at Secureworks discovered a large number of spoofed domains aimed at stealing credentials for…
  • "A New Pacemaker Hack Puts Malware Directly on the Device"
    Pacemakers and implantable insulin pumps, manufactured by Medtronic, have been discovered by researchers to be vulnerable of being controlled by hackers. Vulnerabilities found in Medtronic's software delivery network can allow hackers to execute…
  • "Hacking Smart Plugs to Enter Business Networks"
    A buffer overflow flaw has been discovered in Belkin’s Wemo Insight Smart Plug by researchers at McAfee. A smart plug enables whatever is plugged into it to be remotely switched on or off via an app. The vulnerability found in the Wemo smart plug could…
  • "Security Flaws in Police Body Cameras Open the Devices to Attack"
    A number of security vulnerabilities have been discovered in body cameras used by the police. An analysis of bodycams from Vievu, Patrol Eyes, Fire Cam, Digital Ally, and CeeSc, reveals the presence of vulnerabilities that can allow attackers to perform…
  • "Pushing Cybersecurity for Counties"
    In support of strengthening the cybersecurity of counties, the National Association of Counties and the Multi-State Information Sharing and Analysis Center (MS-ISAC) are collaborating in the encouragement of counties to join MS-ISAC’s cybersecurity…
  • "A Monitor’s Ultrasonic Sounds Can Reveal What’s on the Screen"
    A team of researchers have presented an acoustic side-channel attack that could be used by hackers to gain information pertaining to what is being displayed on a computer monitor. The attack can be performed by analyzing the ultrasonic sounds produced by…
  • SoS Musings #17 - Hacking Bodies and Networks
    SoS Musings #17 Hacking Bodies and Networks
  • "It Takes an Average 38 Days to Patch a Vulnerability"
    A new report published by TCell reveals findings of an examination of over 316 million security incidents, which highlight trends surrounding web application attacks. According to the report, the top five most common types of attacks on web…
  • "Hackers Target Smartphones to Mine Cryptocurrencies"
    Cryptojacking is a cyberattack in which the processing power of a computing device is hijacked to perform cryptocurrency mining. The targeting of smartphones by hackers to perform cryptojacking is increasing as indicated by recent discoveries of mobile…
  • "Researchers Propose New Method for Secure, Speech-Based Two-Factor Authentication"
    A new two-factor authentication (2FA) method has been developed by researchers from the University of Alabama at Birmingham. The method, called “Listening-Watch”, minimizes the amount of interaction usually required in the process of 2FA and provides…
  • The Untold Story of NotPetya, the Most Devastating Cyberattack in History -- Wired
    Interesting article in Wired that goes into the story of NotPetya. This was an amazing impactful malware. See more in the article: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/  
  • "DDoS Attack Volume Rose 50% in Q2 2018"
    Although there has been a decrease in the number of DDoS attacks, the volume of such attacks has increased.  According to a new report released by Link11, DDoS attack volumes have risen to an average 3.3 Gbps during the second quarter of 2018. This…