News
  • "Insider wreaks havoc on company—after he resigns"

    The Navarro Security Group of Florida faced an incident in which a former employee decided to inflict major damages to the company after his departure. With malicious intent to destroy the company that he used to work for, Jonathan Eubanks infiltrated…

  • "The Pros and Cons of Automated Cybersecurity"

    Microsoft’s acquisition of Hexadite, which is a U.S.-Israeli artificial intelligence cybersecurity firm, highlights the growing interest in implementing automation technology into cybersecurity to keep up with the growing threat landscape faced by…

  • "Self-Service Kiosk Maker Avanti Markets Hacked"

    Approximately 1,900 of Avanti Markets’ self-service kiosk vending machines have been hacked using a version of point-of-sale (POS) malware called Poseidon. In the outbreak of this malware, sensitive information has been stolen including users’ names on…

  • "Entangled photons help bug-proof communication"

    As the processing power of computers increases, the less difficult it becomes to decode encrypted data. The full development and implementation of quantum computing can, in fact, deem current encryption algorithms obsolete due to the faster and more…

  • "DRM concerns arise as W3C’s Tim Berners-Lee approves the EME specification"

    The approval of the Encrypted Media Extensions (EME) specification by W3C’s director, Tim Berners-Lee, has sparked concerns and debates in pertinence to the security and privacy of users. Philippe Le Hégaret, project management lead for the W3C, has…

  • "Private Key for Original Petya Ransomware Released"

    “Janus Secretary”, the person or group behind the creation of the original Petya ransomware, has published an encryption master key on Twitter, which could be used to develop decryptors for hard drives that have been crypto-locked by the original…

  • "Hackers are using this new attack method to target power companies"

    Energy companies are being targeted by hackers using a new attack method, which applies a new twist onto the popular phishing tactic, according to researchers at Talos Intelligence. The process of phishing usually consists of the creation and…

  • Happening Now! Tech Talks at SoS Summer Lablet Quarterly

    Sayan Mitra of UIUC delivers the first tech talk at the Summer 2017 Science of Security Quarterly Lablet Meeting hosted by CMU. Three other tech talks are on the day 1 agenda as well as Lablet summareis and an NSA panel. Full details about the agenda can…

  • "Two-factor authentication: An underutilized security measure in businesses"

    Two-factor authentication (2FA) is usually overlooked by businesses when deciding upon which security measures to implement, however this option is becoming increasingly more essential. The implementation of 2FA increases security of businesses’ online…

  • "Cyber experts believe more behind Petya attack than just ransomware"

    Cybersecurity researchers believe the recent global outbreak of Petya indicates open cyber warfare. Recent discoveries made by security experts show that the intentions behind the Petya attack are more far-ranging than expected. Security experts and…

  • "Satellite phone communications can be decrypted in near real-time"

    Two researchers from China have discovered the possibility of decrypting satellite phone communications that use GMR-2 cipher for encryption. The GMR-2 is a stream cipher that consists of a process in which keystreams are generated and ciphertexts are…

  • "Researchers Build Firewall to Deflect SS7 Attacks"

    Researchers from P1 Security have developed a firewall to combat attacks launched by the exploitation of Signaling System 7 (SS7) vulnerabilities within the mobile operators’ core networks, which will be presented at Black Hat USA. If exploited, SS7…