News
-
"Cyber Attackers Exploiting Trust in FTP Servers"Researchers at Forcepoint Security Labs have observed the use of FTP sites to distribute malware. According to researchers, cyberattackers are turning to FTP sites instead of HTTP links for the distribution of malware as FTPs are considered to be trusted…
-
"Delaware Announces Innovative Cybersecurity Partnership for Young Women"A partnership between the SANS Institute and the State of Delaware was announced by Governor John Carney and Delaware’s Chief Information Officer (CIO) James Collins. The partnership is in support of providing cybersecurity training to young women in…
-
"National Cybersecurity Center Opens in Colorado"The National Cybersecurity Center (NCC), which aims to provide a central space for cybersecurity advancements, opened in Colorado Springs. The center is dedicated to cybersecurity research, as well as cybersecurity training and education for students,…
-
“Satori Author Linked to New Mirai Variant Masuta”In a report released Tuesday by NewSky Security researchers have identified two more Mirai variants: Masuta and PureMasuta. The two variants use a Simple Object Access Protocol (SOAP) exploit, allowing the actor to bypass authentication and in return…
-
NSF Releases S&E Indicators 2018The National Science Foundation has released their report on Science and Engineering indicators in education; workforce; R&D; industry, technology, and the global marketplace; invention, knowledge transfer, and innovation; and public attitudes and…
-
Call for Proposals: Handbook of Military and Defense Operations ResearchJames Howard and I are editing a new title from CRC Press, Handbook of Military and Defense Operations Research. We are seeking case studies, essays, and positional papers to illustrate applications of operations research and analytics…
-
SoS Musings #10 - 2018 Internet Security and RegulationsSoS Musings #10 2018 Internet Security and Regulations Around the new year articles predicting internet security start popping up. 2018 is not different.
-
"Study Finds Top Sites Can Be Impersonated Using Non-Latin Alphabet"A study conducted by Farsight Security reveals the use of Internationalized Domain Names (IDNs) to impersonate 125 top brand websites, including Apple, Amazon, Google, Microsoft, Facebook, and many more. IDN homograph attacks use non-Latin alphabets to…
-
"6 Ways Hackers Will Use Machine Learning to Launch Attacks"As artificial intelligence and machine learning are expected to significantly improve upon cybersecurity defenses, hackers are also expected to utilize such technologies in the launch of highly sophisticated cyberattacks. Adversarial machine learning is…
-
"Real-world Intercontinental Quantum Communications Enabled by the Micius Satellite"Intercontinental quantum key distribution (QKD) was successfully demonstrated through the use of a satellite by the name of Micius, which was developed by a team of scientists from the Chinese Academy of Sciences. An experiment conducted by scientists…
-
"How Threat Hunting Enhances Cybersecurity"As the frequency of cyberattacks continues to grow at a significant rate, organizations should take a proactive approach to protect their networks against such attacks. Threat hunting is a way in which organizations could proactively secure their…
-
"One-Quarter of Ethical Hackers Don't Bother Reporting Bugs Due to Lack of Disclosure Policies"HackerOne conducted a survey to which 1,698 members of the ethical hacking community responded. One-quarter of the ethical hackers that responded to the survey reveal that they do not report discovered vulnerabilities as affected companies lack…