News
-
Predatory Journals Recruite Fake EditorA research study published in Nature talks about the issue of predatory journals. These journals generally only try to make money from the academic community rather than giving good peer reviwed publications. The researchers created a fake person, Anna…
-
SoS Musings #1 - We are winning the battles but the war is elusive!SoS Musings #1 We are winning the battles but the war is elusive!
-
Pub Crawl #3Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"US-CERT Warns HTTPS Inspection May Degrade TLS Security"Research reveals that security is weakened when HTTPS inspection tools are ran in TLS traffic streams, which the Department of Homeland Security has now released a warning about. All HTTPS interception products pose potential dangers of man-in-the-middle…
-
"Machine learning can also aid the cyber enemy: NSA research head"Cyber attackers are starting to utilize machine learning technology to launch their attacks. Dr. Deborah Frincke, head of the NSA/CSS Research Directorate talks about potential scenarios in which a malicious user could manipulate the machine learning…
-
“Flaws in MAC address randomization implemented by vendors allow mobile tracking”Researchers at the U.S. Naval Academy have discovered a new attack method to manipulate the MAC address randomization system to track mobile devices. The purpose of this system is to protect the privacy of the user by broadcasting an arbitrary Wi-Fi MAC…
-
Cyber Scene #8 - Checking out, out of, and in with the U.S. Senate on Cyber SecurityCyber Scene March 17, 2017 Cyber Scene is intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of SoS Cybersecurity collaborat
-
"Researchers develop automatic security tests for complex systems"Researchers at Saarland University are developing ways to efficiently detect security vulnerabilities before they are discovered by hackers. Test data generators are used to rapidly generate test inputs for examined programs, however invalid inputs are…
-
"Hackers Can Use Sound Waves To Crack Your Smartphones, Scientists Suggest"Security researchers at University of South Carolina and University of Michigan have discovered a small security loophole in smartphones that could cause major problems. This loophole would enable a hacker to infiltrate and manipulate a device using…
-
"Ben-Gurion University researcher identifies solution to protect online videos and images from cyberattacks"There has been a noticeable increase in the use of online videos and images to launch cyberattacks. A researcher at Ben-Gurion University has discovered a way to protect online videos and images from being infiltrated by hackers through a set a of…
-
"PetrWrap, the 'Almost Flawless' Ransomware"PetrWrap is the latest ransomware that builds upon a malicious cryptographic algorithm of another ransomware called Petya. Petya was discovered in 2016 by Kaspersky Lab and revealed to encrypt stored data and overwrite the MBR of the targeted …
-
"Malicious uploads allowed hijacking of WhatsApp and Telegram accounts"The developers of popular communication service apps, WhatsApp and Telegram, have recently patched their application code after being notified by security researchers of vulnerabilities that would allow attackers to infiltrate user accounts through the…