News
  • "Medical Devices Vulnerable To KRACK Wi-Fi Attacks"
    Medical devices manufactured by Becton, Dickinson and Company have been found to contain a set of Wi-Fi security bugs called KRACK attacks. The exploitation of these flaws could allow hackers to eavesdrop on hospital wireless networks and gain control…
  • "Attack-Simulation Tool Protects Financial Services"
    The financial services industry continues to be one of the most targeted sectors by cyberattacks as cybercriminals are often seeking financial gain. The European Central Bank (ECB) has designed a new cyberattack simulation tool that will be used by…
  • "Most Top Travel Websites Fail to Protect User Security"
    A study conducted by Dashlane reveals that the majority of top travel sites fail to apply adequate security practices to protect user accounts from hackers. According to the findings of the study, most of the travel-related sites examined do not provide…
  • "Why Fileless Malware Will Continue Its Rapid Expansion"
    The prevalence and evolution of fileless malware continues to grow. Since fileless malware attacks do not require the downloading of executable files to infiltrate systems, they are difficult to detect and analyze. This article continues to discuss the…
  • “A Remote Hack Hijacks Android Phones Via Electric Leaks in Their Memory”
    A new form of the Rowhammer attack has been detailed by researchers in the VUSec research group at Vrije Universiteit in Amsterdam. In addition to causing an electromagnetic leakage in memory and triggering bit flips, the attack called GLitch also…
  • Adam's RSA Trip Report
    This year, I had a great opportunity. I got to travel to the RSA Conference and be both an attendee and also help represent Science of Security and Privacy at the agency’s booth. I tried to update the VO each day of the conference, but I found I didn’t…
  • "Millions of Fibre Broadband Routers Open to Remote Control by Hackers"
    Security researchers at VPN Mentor have discovered critical flaws contained by fiber-optic routers. The vulnerabilities could allow hackers to evade authentication and take control over the devices. This article continues to discuss the vulnerabilities…
  • "Flaws in Critical-Infrastructure Software Could Have Meant Catastrophe"
    Security researchers from Tenable discovered vulnerabilities in two widely used critical-infrastructure software programs made by Schneider Electric. The software programs are commonly used at manufacturing sites, solar power facilities, power plants,…
  • "This Malware Checks Your System Temperature to Sidestep Sandboxing"
    GravityRAT is a Trojan that is able to circumvent research efforts through the performance of thermal readings. The Trojan checks the temperature of systems in order to detect the operation of virtual machines (VM) used for sandboxing. This article…
  • "Car Hackers Find Remotely Exploitable Vulnerabilities in Volkswagen and Audi Vehicles"
    Multiple vulnerabilities have been discovered in Volkswagen and Audi vehicles. According to security researchers from Computest, the exploitation of these vulnerabilities could allow hackers to listen in on drivers and perform real-time car tracking…
  • "How Hackers Could Cause Chaos on America's Roads and Railways"
    The Colorado Department of Transportation faced ransomware attacks earlier this year, which had a significant impact on the agency's operations. These cyberattacks highlight the importance of strengthening cybersecurity protections for transportation…
  • "Cybersecurity Teams That Don't Interact Much Perform Best"
    A recent study conducted by Army scientists indicates that successful high-performing cybersecurity teams have fewer interactions among team members. The observation was made from the study of how cyber defense teams coordinated and performed in…