News
-
"Protecting Smart Grids and Critical Infrastructure Are Top Concerns for Energy and Utility Firms"As the energy market relies on technological innovations such as machine learning to increase efficiency, the concern for cybersecurity deepens. Although advancements such as smart electricity grids and digital oil fields offer increased…
-
"Quantum Computing Paranoia Creates a New Industry"Although research and development of quantum computers is still in progress, security companies are already anticipating breaks in encryptions due to quantum computing capabilities. The National Institute of Standards and Technology suggests the…
-
Synopses of Presentations: Quarterly Lablet meeting NCSU 1-2 Feb 2017The winter 2016 quarterly Science of Security (SoS) Lablet meeting was held at North Carolina State University on February 1 and 2, 2017. In addition to speakers from the Lablets and NSA, corporate speakers provided insights into the problems of…
-
Researchers, Industry, NSA meet, discuss Privacy, Artificial IntelligenceRaleigh, NC February 2, 2017 The winter 2016 quarterly Science of Security (SoS) Lablet meeting, sponsored by NSA, was hosted at North Carolina State University on February 1 and 2, 2017. Laurie Williams and Munindar Singh, Principle…
-
"Android Phones Still Open To WAP Attacks"Researchers at Context Information Security have discovered that Android phones are still susceptible to SMS-based attacks. Such attacks can disable functionality and invite other attacks such as ransomware. These vulnerabilities are suspected to…
-
Cards Promoting ValidityNormally, blog posts about a super bowl commerial would not rate as interesting for the Science of Security community. However; one did.
-
"Cloud Storage The New Favorite Target Of Phishing Attacks"According to recent security reports released by PhishLabs, phishing was the most common attack vector in 2016. Reports on phishing trends also reveal that cloud storage service providers such as Google and DropBox have increasingly been targeted over…
-
"HTTPS abusers hide malware in encrypted tunnels to avoid security"As utilization of encrypted navigation through HTTPS increases, cyber criminals have detected vulnerabilities to bypass detection. Investigations reveal that hackers have discovered ways to attack by exploiting the inability…
-
"Hacking printers exploiting Cross-site printing (XSP) attacks"Researchers at University Alliance Ruhr have discovered security vulnerabilities within 20 different printer models, which could be exploited by hackers to steal sensitive information and disable hardware devices. These security vulnerabilities are …
-
"Biometrics And Payments: Companies Are Using Your Fingerprints For Cybersecurity"As the number of security breaches rises, companies within the transactions industry are further exploring methods of biometrics as a means of uniquely identifying consumers based on biological characteristics, in order to strengthen the…
-
"Healthcare Hack Offers Key Lessons in Cybersecurity, Attorneys Write"Cybersecurity attorneys from the national law firm, LeClairRyan, advise companies and consumers to learn lessons from the 2015 data breach of healthcare firm, Anthem, which hacked personal data of about 80 million Americans. Attorneys emphasize the…
-
Disposable Drones?San Francisco based R&D firm, Otherlab, is being funded by DARPA in a quest to develop low cost, "disposable" drones that can deliver time-sensitive items such as food in emergency or disaster situations. Currently the drones…