News
  • "The Problems With Hacking Back"
    The Active Cyber Defense Certainty (ACDC) Act was proposed to empower companies to adopt a more proactive approach to handling cybersecurity. The proactive approach would permit companies to hack back into other computer networks for the purpose of…
  • "Security Researchers Discover Multiple Epic Vulnerabilities in EOS Blockchain"
    The EOS blockchain platform has been discovered to contain multiple high-risk vulnerabilities. According to security researchers from a China-based cybersecurity firm by the name of Qihoo 360, the exploitation of these security vulnerabilities could…
  • "Internet of Things: When Objects Threaten National Security"
    IoT devices are becoming a greater threat to national security. The increasing development and use of IoT technologies provides more entry points for attackers into global information networks. This article continues to discuss the rise of IoT devices,…
  • "Attacking Hard Disk Drives Using Ultrasonic Sounds"
    New research reveals that hard disk drives (HDDs) are susceptible to interference from ultrasonic signals. According to researchers at the University of Michigan and Zhejiang University, ultrasonic attacks on HDDs can be launched using nearby sound…
  • "Researchers Create Framework to Prevent Cyber Attacks on Connected Cars"
    A framework has been created by scientists at the University of Texas, San Antonio (UTSA) to protect Internet-connected cars from cyberattacks. The framework called the Authorization Framework for Connected Cars could also be used in the prevention of…
  • "FBI: Reboot Your Home and Small Office Routers to Counter Russian Malware"
    The FBI, DHS, and DoJ urge the reboot of small office and home office (SOHO) routers to counter the infection of malware by the name of VPNFilter, which is linked to a Russian state-sponsored hacking group. The malware has been discovered to have…
  • "Senate Defense Bill Aims to Scrub Cyber Adversaries from U.S. Military Tech"
    The Senate Defense Bill includes cyber provisions that are aimed at bolstering the cybersecurity of the U.S. For instance, companies from which the U.S. military purchases equipment and services, will be required to disclose business engagements that…
  • DHS Cybersecurity Strategy
    DHS Cybersecurity Strategy
  • "Ultrasound-Firewall for Mobile Phones"
    A mobile application that can detect and block acoustic cookies has been developed in the SoniControl project of St. Pölten University of Applied Sciences. The application is considered to be an ultrasound firewall for smartphones and tablets that can…
  • Pub Crawl #17
     
  • Cyber Scene #21 - Facebook Follow up and Fall Out
    Cyber Scene #21 Facebook Follow up and Fall Out
  • "Macs Infected With New Monero-Mining Malware"
    New malware by the name of mshelper has been discovered to be hijacking Apple Macs to mine for Monero cryptocurrency. The cryptomining malware makes use of XMRig, which is a legitimate mining tool. This article continues to discuss the mshelper malware…