-
"A New Method to Detect False Data Injection (FDI) Attacks"A solution to detecting false data injection (FDI) attacks targeting critical infrastructure such as electric grids has been proposed by researchers at Beijing Institute of Technology (BIT). The method proposed by researchers involves the use of a…
-
"Researchers Allege ‘Systemic’ Privacy, Security Flaws in Popular IoT Devices"Researchers with Dark Cubed and Pepper IoT have reported the vulnerability of IoT devices, including smart cameras, smart plugs, and security systems, to having security and privacy issues. According to the researchers, these devices have security and…
-
"Security Isn't Enough. Silicon Valley Needs 'Abusability' Testing"Former Federal Trade Commission chief technologist, Ashkan Soltani, calls for tech companies to pay as much attention to the abusability of their products as they do to the security of the technology. In the examination of abusability, companies must…
-
"GDPR-Ready Organizations See Lowest Incidence of Data Breaches"Findings of Cisco’s 2019 Data Privacy Benchmark Study highlight the benefits seen by businesses when they invest in good privacy protections. The study found that GDPR-ready organizations experience less data breaches, have shorter system downtimes, and…
-
"Better Safeguards for Sensitive Information"Researchers have conducted a study aimed at improving the lower boundary of the quantum key distribution (QKD) encryption channel in order to enhance the secret key capacity. The study concentrated on the noisy thermal amplifier channel. This article…
-
-
SoS Musings #22 - Exploring the Art of Deception in CybersecuritySoS Musings #22 Exploring the Art of Deception in Cybersecurity
-
Cyber Scene #29 - Geopolitics, Trade and Tech: No "Global-exit"Cyber Scene #29 Geopolitics, Trade and Tech: No "Global-exit"
-
"New Mac Malware Uses Steganography to Sneak Into Computers"A strain of new Mac malware, called VeryMal, has recently emerged and it is being spread through the use of a technique known as steganography, which is increasingly being used by hackers. Steganography is a method in which data…
-
"Phishing Attacks Continue to Rise, Proofpoint Reports"Proofpoint recently released a report, called State of the Phish, which highlights the continuing rise in phishing attacks. The report also brings further attention to employees' lack of awareness and understanding surrounding cybersecurity terms…
-
"Patented Technology Cloaks Location on Mobile Devices to Protect Privacy"Technology aimed at preserving privacy while using location-based apps and services on mobile devices has been developed by a researcher at Iowa State University. The location-cloaking technology is valuable as location-based information can be used by…
-
"265 Researchers Take Down 100,000 Malware Distribution Websites"Almost 100,000 websites, used in the distribution of malware, were taken down as a result of the efforts of 265 security researchers in a project, called URLhaus. Security researchers submitted an average of 300 abuse reports daily to companies…
News