News
  • "Phishing attacks using internationalized domains are hard to block"
    The latest version of Google Chrome tackles phishing by restricting how domain names made up of non-Latin characters are displayed by the browser as attackers were using a certain technique involving these characters to create highly convincing phishing…
  • "New Strain of Linux Malware Could Get Serious"
    Linux/Shishiga is a new strain of Linux malware that is raising major concerns as it could transform into a dangerous widespread security threat. Researchers of this new strain of malware have revealed that it uses four different protocols, SSH,…
  • "Stuxnet: The Computer Worm That Keeps on Living"
    Security researchers state that the Stuxnet worm flaw is still the most exploited despite Microsoft’s release of a patch to fix this flaw seven years ago. According to Kaspersky Lab, the Windows Shell flaw responsible for the Stuxnet worm is still first…
  • "Experts Find 10 Flaws in Linksys Smart Wi-Fi Routers"
    Researchers at IOActive have discovered 10 vulnerabilities within Linksys routers that could be exploited by hackers to launch DoS attacks, expose and steal sensitive information, as well as configure malicious backdoors for future attacks. Linksys…
  • "APT Attack Activity Occurs at 'Low, Consistent Hum,' Rapid7 Finds"
    Security vendor, Rapid7, has a released a quarterly threat intelligence report, outlining analyses of encountered security incidents by customers, which were then handled and managed by the company’s services. This report reveals that advanced persistent…
  • "Patched Flaw in Bosch Diagnostic Dongle Allowed Researchers to Shut Off Engine"
    Researchers at Argus Cyber Security, a firm dedicated to researching automobile security, has discovered two vulnerabilities within Bosch’s Drivelog Connect OBD-II dongle and the smartphone app that would allow the engine of a vehicle to be shut off or…
  • SoS Musings #2 - Empirical Research
    SoS Musings #2 Empirical Research
  • Pub Crawl #4
     
  • Cyber Scene #9 - Private Sector Cyber Voices Speak as Congressional Committees Move to Closed Sessions
    Cyber Scene Cyber Scene is intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of SoS Cybersecurity collaboration and extend its outreach.…
  • "Lightbend to offer security analysis for Scala through HPE Security Fortify integration "
    Lightbend, the providing company of the Scala programming language and the Reactive application development platform for developing distributed systems, has recently announced its collaboration with HPE Security Fortify to further improve the Scala…
  • "IoT malware clashes in a botnet territory battle"
    Mirai, the notorious IoT malware, faces new competition as a new malware emerges by the name of “Hajime”. Security researchers have discovered this new malware to be much more resilient than Mirai in that it forms botnets by communicating over a…
  • "How Fog Computing Will Shape The Future Of IoT Applications And Cybersecurity"
    According to projections made by Markets and Markets, fog computing is predicted to expand at a significant rate during the next five years as a result of the rising demand for IoT device interconnectivity, machine communication, and real-time…