Cybersecurity

The first technique to detect a drone camera illicitly capturing video is revealed in a new study published by Ben-Gurion University of the Negev (BGU) and Weizmann Institute of Science cyber security researchers. The study addresses increasing...
by American Associates, Ben-Gurion University of the Negev
10:54am
1.15.2018
On Friday, the U.S. Department of Commerce and the U.S. Department of Homeland Security released a draft report to President Trump in response to the May 11, 2017, Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks...
by U.S. Department of Commerce
11:20am
1.8.2018
Advertisement
The North Korean government was behind the massive ransomware cyberattack that affected hundreds of thousands across the globe earlier this year, U.S. officials announced this week, stating that the Trump administration, international allies and...
Associate Editor
|
1:28pm
12.20.2017
A University at Buffalo-led team of researchers has discovered how to identify smartphones by examining just one photo taken by the device. The advancement opens the possibility of using smartphones—instead of body parts—as a form of identification...
by University of Buffalo
1:22pm
12.13.2017
A partnership between the University of Luxembourg's Centre for Security, Reliability and Trust and Intel's Collaborative Research Institute for Collaborative Autonomous...
Associate Editor
|
12:49pm
11.30.2017
Advertisement
Today, DHS and FBI released a pair of Joint Technical Alerts that provide details on tools and infrastructure used by North Korea to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally.
by U.S. Department of Homeland Security
10:58am
11.15.2017
The hackers who disrupted the U.S. presidential election had ambitions well beyond Hillary Clinton's campaign, targeting the emails of Ukrainian officers, Russian opposition figures, U.S. defense contractors and thousands of others of interest to...
by Raphael Satter, Jeff Donn and Justin Myers, Associated Press
12:22pm
11.2.2017
The chairman of the Federal Communications Commission said he's willing to work with corrections officials, telecom companies and the FBI to combat cellphones in the nation's prisons.
by Meg Kinnard, Associated Press
1:23pm
10.26.2017
Advertisement
Researcher and associate professor of electrical engineering Changzhi Li of Texas Tech University envisions a form of passive and “continuous authentication” with his “cardiac password” project, an ongoing research effort to develop sensors that...
Associate Editor
|
1:27pm
10.19.2017
Researchers from Ben-Gurion University of the Negev in Israel have demonstrated that security cameras with no connection to the internet can be manipulated to both send and receive messages using only infrared light, in a so-called “aIR-Jumper” air...
Associate Editor
|
12:09pm
10.5.2017
Advertisement
Advertisement
A new study from the U.S. Army Research Laboratory presents evidence that the number of cyber intrusions can be predicted, particularly when analysts are already observing activities on a company or government organization's computer network.
by U.S. Army Research Laboratory
1:04pm
9.21.2017
Safety measures such as the use of USB “condoms” that block data lines but leave power lines open can protect users from some conventional attacks, such as spying from untrusted public charging stations. But what if USB devices could steal...
Associate Editor
|
9:17am
9.15.2017
Advertisement
An increase in computerized, “smart” power grids, while offering multiple benefits to the efficiency of energy transmission, have opened these vital structures up to a new threat—cyberterrorists.
Associate Editor
|
12:26pm
9.5.2017
Researchers Jonathan Lusthaus and Federico Varese, of the Human Cybercriminal Project at the University of Oxford, traveled to Romania in 2014 and 2015 to study the oft-ignored real-world aspect of cybercrime in an area known to be a hub for one...
Associate Editor
|
12:00pm
8.18.2017
Researchers have demonstrated how it is possible to transform a smart device into a surveillance tool that can collect information about the body position and movements of the user. Their approach involves remotely hijacking smart devices to play...
by University of Washington
10:24am
8.17.2017
Advertisement
Back-to-back Las Vegas cybersecurity/hacker conferences Black Hat and Def Con have packed the last few weeks with buzzworthy cyber news. With dozens of talks, presentations, demonstrations, workshops and hacking contests, the two events have become...
Associate Editor
|
12:49pm
8.11.2017
While online thieves have long targeted banks for digital holdups, today's just-in-time manufacturing sector is climbing toward the top of hackers' hit lists. Production lines that integrate computer-imaging, barcode scanners and measuring...
by Emery P. Dalesio, Associated Press
8:54am
8.9.2017
Marcus Hutchins, a young British researcher credited with derailing a global cyberattack in May, was arrested for allegedly creating and distributing malicious software designed to collect bank-account passwords, U.S. authorities said Thursday.
by Ken Ritter and Matt O'Brien, Associated Press
9:09am
8.4.2017
Advertisement
EEG headsets aren’t just for medical use anymore—in recent years, brain wave sensing technology and wearables have been marketed to consumers for personal and recreational use. But like all other devices tangled up in the internet of things that...
Associate Editor
|
11:54am
8.3.2017
Machine learning expert Hyrum Anderson, technical director for data science at Endgame, explains in new research presented today at Black Hat USA 2017 that artificially intelligent defense systems could be vulnerable to an “evil twin” type threat—...
Associate Editor
|
12:09pm
7.27.2017
Advertisement
Advertisement
Ovidiy Stealer is an info-stealing tool that takes credentials from browsers and applications and hands them over to its user on an organized interface where they can keep track of the machines they’ve infected. This simplistic but potentially...
Associate Editor
|
12:05pm
7.20.2017
Ukraine has dodged a second cyberattack, officials said Wednesday, suggesting that the digital campaign which paralyzed computers across the country and around the world is ongoing. Ukraine is still trying to find its feet after scores or even...
by Raphael Satter, Associated Press
10:31am
7.6.2017
Advertisement
A cyberattack that caused indiscriminate economic damage around the world was apparently designed to create maximum havoc in Russia's neighbor and adversary Ukraine, security researchers said. While the rogue software used in the attack was...
by Raphael Satter, Frank Bajak and Jan M. Olsen, Associated Press
9:59am
6.30.2017
Early this week, the U.S. Supreme Court ruled in favor of convicted sex offender Lester Packingham, who argued that the state of North Carolina’s ban of registered sex offenders from all social networking sites violated his First Amendment rights.
Associate Editor
|
2:14pm
6.23.2017
Facebook inadvertently exposed the personal details of content moderators to suspected terrorist users, according to a report by The Guardian. The security lapse affected more than 1,000 workers across 22 departments at Facebook who used the company...
by Olivia Solon, The Guardian US
11:14am
6.19.2017
Advertisement
Advertisement
Advertisement
Advertisement