News
  • "The Pentagon Has a Plan to Verify Identity via Smartphones"
    A project funded by the United States Department of Defense aims to implement new technology into smartphones that could verify the identity of users and assign risk scores. The technology will verify the identity of a user by analyzing attributes that…
  • "Wicked Botnet Uses Passel of Exploits to Target IoT"
    A new variant of the Mirai botnet by the name of Wicked has emerged. According to security researchers at Fortinet, Wicked makes use of at least three exploits to target unpatched IoT devices. This article continues to discuss the Wicked botnet in…
  • "Researchers Developing Cancelable Combined Fingerprint and Finger Vein System"
    Biometric technology is being developed by researchers at Australia’s Edith Cowan University that can perform a scan of fingerprints and finger veins simultaneously. Researchers claim that the technology is resistant to spoofing attacks that could be…
  • Getting Started on Science Fair Projects
    What makes a great cyber science fair project? The SoS-VO has a node for that...
  • "Bolstering Government Vehicle Telematics Cybersecurity"
    The Department of Homeland Security Science and Technology Directorate (S&T) and the Department of Transportation’s Volpe National Transportation Systems Center (Volpe Center) worked together to strengthen the cybersecurity of government vehicle…
  • 22 Students Recognized by the National Security Agency at ISEF 2018
    The National Security Agency Research Directorate recognized 22 students on Thursday. These students were selected for their outstanding research contributions. They were among the over 1,800 students presenting their research at the 2018 Intel…
  • "US Department of Homeland Security Reveals New Cybersecurity Strategy"
    The U.S. Department of Homeland Security (DHS) recently released its Cybersecurity Strategy. The strategy provides a framework to improve upon the execution of cybersecurity responsibilities as the cyber risk landscape continues to evolve. The strategy…
  • "Threat Intelligence Shows Tried and True Techniques Continue to Work for Hackers"
    New threat intelligence data shows that phishing and ransomware attacks continue to be largely used by malicious actors. These simple attacks remain highly successful for hackers. This article continues to discuss trends in industry cybercrime, attack…
  • "GDPR Compliance Deadline Still a 'Significant' Challenge for Many"
    As the enforcement of the European Union’s General Data Protection Regulation (GDPR) closely approaches, organizations are still finding it difficult to comply with the data protection rules of the legislation. Organizations impacted by GDPR are expected…
  • "Not so Safe in the Cloud - a Quarter of Enterprise Hit by Cryptojackers"
    RedLock recently released its newest Cloud Security Trends report, which reveals a significant increase in cloud cryptojacking attacks faced by enterprises. The report highlights a rise in the unauthorized use of cloud computing resources to mine…
  • SOUPS now accepting submissions for workshops
    The 2018 Symposium on Usable Security and Privacy (SOUPS) is now accepting submissions for workshops to be held August 12, 2018, in Baltimore, MD. Submission deadline is May 25. Workshops include:
  • "Four Cybersecurity Policies Transforming Government"
    U.S. government agencies will be undergoing a transformation to improve upon their cybersecurity systems and practices in order to reduce cyber risks. There are four cybersecurity policies that will incite this transformation. This article continues to…