News
-
"Phishing Attack Bypasses Two-Factor Authentication"Kevin Mitnick, a Chief Hacking Officer at KnowBe4, has demonstrated the use of a tool called evilginx to perform phishing attacks in order to gain control over targeted user accounts. The use of this tool can allow threat actors to evade two-factor…
-
"Security Researchers Want to Force People to Use Different Passwords for Every Website"Professors from the Computer Science department at the University of North Carolina, Ke Coby Wang and Michael Reiter, have proposed a way to stop people from reusing passwords on different websites. The professors emphasize the importance of…
-
Watch Microsoft Build 2018 Videos OnlineYes, Microsoft has a large software developers conference, Build. Wish you were there learning about software development at Microsoft. Topics like Windows, Azure, Cortana, AI, ARM, etc. Microsoft has posted the videos of the keynotes and sessions on…
-
Watch Google I/O 2018 Videos OnlineDidn't attend Google I/O 2018? I didn't either, but the videos from the event are on YouTube. Google says keynotes and all sessions are there. Wondering what Google I/O 2018 is? Well, its Google's big developer conference. So lots of things google,…
-
"The Critical Need for Automation in Agency Cyber Defense"Traditional manual methods for defending the data and critical infrastructure of nation-states are no longer sufficient as cyberattacks are increasingly being launched using automation. Federal agencies are encouraged to implement defensive automation in…
-
"Inside the New, State-Of-The-Art U.S. Cyberwarfare Bunker"The Integrated Cyber Center (ICC) has officially been opened. The ICC, located inside Fort Meade in Maryland, will help the NSA and U.S. Cyber Command collaborate in the battle against foreign cyber threats. This article continues to discuss the goal,…
-
NSA NCTOC TD - Talks at RSAThe National Security Agency's Dave Hogue, Technical Director in the NCTOC (NSA's Cyber Threat Operations Center ) talked at RSA about NSA's NCTOC.
-
"Keeping Big Data safe"The Unlinkable Data Challenge has been announced by the National Institute of Standards and Technology (NIST). The challenge invites participants to develop methods to de-identify the data used by the public safety community in order to protect the…
-
"Cryptojacking Spreads Across the Web"As cryptocurrencies become more popular, the performance of cryptojacking rises. Cryptojacking is known as the unauthorized mining of cryptocurrency. This article continues to discuss the concept of cryptocurrency mining, valid purposes for performing…
-
New Science of Security and Privacy Annual Report ReleasedThe annual report detailing the 2017 accomplishments of the Science of Security and Privacy Initatitive has been released. The report includes advances SoS has made in fundemental research, promoting rigorous research methods and in growing the SoS…
-
New NSA-funded "Lablets" to Advance the Science of Security and PrivacyThe National Security Agency has selected 6 Institutions to host Science of Security and Privacy Lablets. These six Lablets will be tasked for the next 5 years to discover fundamental principles in cybersecurity and privacy. The 6 Institutions are:
-
NSA Lablet at Vanderbilt to make sure America keeps moving after hacksThe National Security Agency is giving a Vanderbilt University team and their collaborators five years and several million dollars to figure out how to make cyber and Internet of Things safer. Vanderbilt is getting what’s called a Science of Security…