News
-
"Mac Malware Steals Cryptocurrency Exchange Cookies, Text Messages for 2FA Authentication"New Mac OS malware, called CookieMiner, has been detailed by Palo Alto Networks' Unit 42 security research team. According to researchers, CookieMiner targets web browsers, Chrome and Safari, in an attempt to steal cryptocurrency exchange and wallet…
-
"Quantum Internet Can Offer Virtually Unbreakable Encryption"A step towards a quantum secure internet has been made by Professor Hoi-Kwong Lo from the University of Toronto and his team of engineering researchers. The researchers are working to develop all-photonic quantum repeaters, which will help in the success…
-
"Researchers Try Pretence to Beat Cyberattacks"Researchers at the University of Missouri have developed a new artificial intelligence (AI) system for the purpose of improving upon the protection of digital information stored in the cloud against cyberattacks. The researchers have applied the…
-
"A New Method to Detect False Data Injection (FDI) Attacks"A solution to detecting false data injection (FDI) attacks targeting critical infrastructure such as electric grids has been proposed by researchers at Beijing Institute of Technology (BIT). The method proposed by researchers involves the use of a…
-
"Researchers Allege ‘Systemic’ Privacy, Security Flaws in Popular IoT Devices"Researchers with Dark Cubed and Pepper IoT have reported the vulnerability of IoT devices, including smart cameras, smart plugs, and security systems, to having security and privacy issues. According to the researchers, these devices have security and…
-
"Security Isn't Enough. Silicon Valley Needs 'Abusability' Testing"Former Federal Trade Commission chief technologist, Ashkan Soltani, calls for tech companies to pay as much attention to the abusability of their products as they do to the security of the technology. In the examination of abusability, companies must…
-
"GDPR-Ready Organizations See Lowest Incidence of Data Breaches"Findings of Cisco’s 2019 Data Privacy Benchmark Study highlight the benefits seen by businesses when they invest in good privacy protections. The study found that GDPR-ready organizations experience less data breaches, have shorter system downtimes, and…
-
"Better Safeguards for Sensitive Information"Researchers have conducted a study aimed at improving the lower boundary of the quantum key distribution (QKD) encryption channel in order to enhance the secret key capacity. The study concentrated on the noisy thermal amplifier channel. This article…
-
SoS Musings #22 - Exploring the Art of Deception in CybersecuritySoS Musings #22 Exploring the Art of Deception in Cybersecurity
-
Cyber Scene #29 - Geopolitics, Trade and Tech: No "Global-exit"Cyber Scene #29 Geopolitics, Trade and Tech: No "Global-exit"
-
"New Mac Malware Uses Steganography to Sneak Into Computers"A strain of new Mac malware, called VeryMal, has recently emerged and it is being spread through the use of a technique known as steganography, which is increasingly being used by hackers. Steganography is a method in which data…