News Items

  • news

    Visible to the public "Network traffic provides early indication of malware infection"

    Researchers reveal the capability of detecting malware infection far in advance with the examination of malware-related network traffic carried by an ISP preceding the actual detection of malware. In the study of this new malware-independent detection strategy, researchers conducted an analysis of network events provided by years of network traffic handled by an ISP. DNS requests made by malware samples and the re-registration timing of expired domains were also focuses of this study. This article further discusses the details of this study, the collaboration and support behind this research, other findings made, as well as how this discovery is expected to significantly improve response times and reduce impacts of attacks.

    Phys.org reports "Network traffic provides early indication of malware infection"

  • news

    Visible to the public 2017 ISEF Winners of NSA RD Awards

    And the National Security Agency Research Directorate Awards Winners are:

  • news

    Visible to the public "Fujitsu high-speed technology identifies within minutes damage from cyberattacks"

    Fujitsu has announced a high-speed forensic technology that they have developed to identify the degree to which an organization's intranet has been damaged after a targeted cyberattack. Fujitsu's new technology shortens the average time required to identify damages inflicted by cyberattacks, from weeks to minutes. This new technology will be added to Fujitsu's Security Solution Global Managed Security Service, which also provides enhanced support for security resilience, mitigation of risks, and minimization of damage from cyberattacks. This article provides further details behind this new technology and Fujitsu's collaboration with US-based Dtex Systems to improve upon human behavior through machine learning.

    GSN reports "Fujitsu high-speed technology identifies within minutes damage from cyberattacks"

  • news

    Visible to the public "Boy, 11, hacks cyber-security audience to give lesson on 'weaponisation' of toys"

    An 11 year old boy named Reuben Paul performed a demonstration at a cybersecurity conference, showing the weaponisation of interconnected smart toys through the infiltration of Bluetooth devices, which left the audience astonished. This article discusses how the demonstration was performed, the dangers that could arise with weaponisation of IoT devices, and the surprising development of Reuben's IT skills.

    The Gaurdian reports "Boy, 11, hacks cyber-security audience to give lesson on 'weaponization' of toys"

  • news

    Visible to the public "Unraveling mobile banking malware, Check Point"

    Check Point researchers have conducted an investigation to decipher the operation behind banking malware. It has been discovered that the development and operation of banking malware requires little skill with the availability of simplified tools and open source code. Studies also show that the spread of banking malware has increased through Google Play and obfuscation techniques. This article further discusses how attackers are gaining access to such tools and open source code to create banking malware, how distribution of this malware has increased, and other findings of this study.

    SC Media reports "Unraveling mobile banking malware, Check Point"

  • news

    Visible to the public  "What's next for NIST cybersecurity framework?"

    Officials at an NIST event emphasize the importance for constant maintenance of cyber procedures as the evolution of attacks continue. It is essential for companies to perform continuous maintenance so that in the case of an attack, operations aren't affected as the process of detection and recovery is rapidly acted upon. In response to President Trump's newly signed executive order on cybersecurity, the NIST has released a draft implementation guide for federal agencies, which outlines eight ways the cybersecurity framework can be incorporated into the existing NIST risk management standards. This article discusses the importance of keeping good cyber hygiene, sharing of information about data breaches between companies, and the NIST Cybersecurity Framework 1.1.

    GCN reports "What's next for NIST cybersecurity framework?"

    NIST's "Cybersecurity Framework: Implementation Guidance for Federal Agencies"

  • news

    Visible to the public "Oddities in WannaCry ransomware puzzle cybersecurity researchers"

    The massive spread of the WannaCry ransomware to more than 100 countries within a few hours have left cybersecurity researchers baffled as to how this attack was initiated, the rapid speed of which it spread as well as how the hackers behind this attack aren't making an abundance of money from it. This article further discusses the details of WannaCry, the difficulties of investigating the initial starting points of this attack, how this malware differs from other ransomware, and possible links to this attack.

    Reuters reports "Oddities in WannaCry ransomware puzzle cybersecurity researchers"

  • news

    Visible to the public "Keylogger Found in Audio Driver of HP Laptops"

    Researchers at Modzero, a Swiss cybersecurity firm, have revealed their discovery of a keylogger hidden within audio drivers of HP laptops. This feature found in the audio driver is identified as a keylogger as it records and saves all of a user's keystrokes to a local file, which any person, third-party software, or malware could have access to. This article discusses which audio driver this keylogger was discovered in, identifies specific HP laptop models containing this feature, as well as provides steps for checking and removing the keylogger.

    BleepingComputer reports "Keylogger Found in Audio Driver of HP Laptops"

  • news

    Visible to the public "DHS S&T’s Transition to Practice program unveils 2017 cohort"

    Researchers at federally funded laboratories and academic research centers are prepared to introduce new cybersecurity technologies that they have developed to the commercial market. The eight new technologies will be showcased by DHS Science and Technology Directorate's Transition to Practice program on the 16th of May in Washington D.C. Each fiscal year, the TTP program showcases a selected set of promising federally funded cybersecurity technologies to merge into its well-established transition-to-market program. This article further discusses the details of this program and outlines the eight new TTP technologies that will be introduced this year.

    Homeland Security News Wire reports "DHS S&T's Transition to Practice program unveils 2017 cohort"

  • news

    Visible to the public "President Trump signs cybersecurity executive order"

    The highly anticipated executive order addressing cybersecurity has been signed by President Trump. Tom Bossert, Trump's homeland security adviser, states that the order has been devised to achieve the president's goal to protect the security of America, also in regards to cyberspace. The executive order addresses three central priorities in which Trump's administration will embrace in hopes of securing cyberspace, including safeguarding federal networks, updating antiquated systems, and guiding the collaboration between all department and agency heads. This article further discusses the details of the executive order, why cybersecurity is a major issue within federal agencies, and other events that have inspired this order.

    USA Today reports "President Trump signs cybersecurity executive order"

  • news

    Visible to the public "Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms"

    A study conducted by Bronium, a cybersecurity company, at RSAC 2017 reveal the average percentages of security professionals that have admittedly given into ransomware demands as well as evaded or disabled security protocols put in place by their organization. Possible reasons for this increase in security workarounds include security fatigue and overconfidence in current security implementations. This article further discusses the results of this study, possible reasons for this increase in security sidestepping, and strategies for minimizing the acts of circumventing security standards and practices within an organization.

    TechRepublic reports "Study finds cybersecurity pros are hiding breaches, bypassing protocols, and paying ransoms"

  • news

    Visible to the public "Microsoft’s novel approach to securing IoT"

    With the rise of IoT bots like Mirai, new approaches must be developed to ensure the continuous renovation and integrity of IoT devices. Microsoft is aiming to change the course of IoT deployments with Project Sopris. Project Sopris hardware is expected to improve the security of hardware and communication channels, through the emphasis on microcontrollers. This article further discusses the structure, process, study, and goal of Project Sopris.

    InfoWorld reports "Microsoft's novel approach to securing IoT"

  • news

    Visible to the public "Researchers unveil new password meter that will change how users make passwords"

    Researchers from Carnegie Mellon University and the University of Chicago have introduced a new advanced password meter to assist people in creating stronger passwords. Traditional password meters will simply indicate whether a password is weak or strong, but not how to improve upon it. The newly developed password meter provides real-time feedback and suggestions to a user as they are typing their password. The meter functions through the operation of an artificial neural network. This article discusses how researchers conducted their study of password creation, findings of this study, and where their study will be presented.

    Phys.org reports "Researchers unveil new password meter that will change how users make passwords"

  • news

    Visible to the public "Hackers Are Remotely Controlling Industrial Robots Now"

    Security researchers have discovered the possibility of hacking industrial robots. Security researchers demonstrated this possibility by hacking the IRB 140 industrial robot arm. This robot could be hacked to disturb the motion of drawing a straight line. Though the consequences of hacking this specific model is slight, this demonstration still ignites major concerns over the hacking of much larger industrial robots, which could lead to more serious damages. This article further discusses this demonstration, dangerous effects this type of hacking pose, the manufacturer's response to this finding, and other discoveries made by researchers in this study.

    Motherboard reports "Hackers Are Remotely Controlling Industrial Robots Now"

  • news

    Visible to the public "New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack"

    A new IoT Botnet, Persirai, has been discovered by researchers at Trend Micro. Persirai has targeted 1,000 different models of IP cameras, leaving 120,000 cameras vulnerable to attacks. This article further discusses the details of Persirai, how researchers uncovered this new IoT botnet, notable differences from the notorious Mirai botnet, and suggestions for improving the implementation of security for IP cameras in order to prevent the infiltration of such attacks.

    Dark Reading reports "New IoT Botnet Discovered, 120K IP Cameras At Risk of Attack"

  • news

    Visible to the public "Snake cyberespionage malware is ready to bite Mac users"

    A Russian cyberespionage group that goes by the names "Snake, Turla or Uroburos" has been actively launching complex cyberespionage attacks since 2007. The main targets of these attacks are government agencies, including intelligence agencies, military organizations, and embassies. These attacks have mainly focused on the Windows platform, however researchers from Fox-IT, a Dutch cybersecurity firm, have discovered a macOS variant of the group's malware tool, which indicates great interest in expanding attacks to Mac users. This article discusses the details of the Snake macOS sample discovered by researchers.

    PCWorld reports "Snake cyberespionage malware is ready to bite Mac users"

  • news

    Visible to the public “Privacy Threats Through Ultrasonic Side Channles on Mobile Devices”

    Researchers at Technische Universitat Braunschweig in Germany have recently shared their research into the discovery of ultrasonic beacons being used to monitor consumer purchasing and television viewing habits to generate targeted advertising. Researchers have discovered that 234 Android mobile applications covertly listen for ultrasonic beacons that are embedded in audio, which can be used to track users and form relevant advertising. This capability raises great concerns pertaining to privacy. This article further discusses the key discoveries made by researchers and outlines other highlights of research shared within "Privacy Threats Through Ultrasonic Side Channles on Mobile Devices."

    Threatpost reports "Privacy Threats Through Ultrasonic Side Channles on Mobile Devices"

  • news

    Visible to the public "Homeland Security Unit Warns Of Malware Campaign Targeting Critical Systems In The Manufacturing, Energy Sectors"

    The National Cybersecurity and Communications Integration Center has issued an alert to private sector and government agencies about a persistent malware campaign that is targeting critical systems in energy, healthcare, and manufacturing sectors. Attackers behind this malware campaign are inserting complex malware implants onto critical systems, using stolen administrative local and domain credentials. NCCIC urges all organizations within these sectors to perform thorough security investigations and monitoring to detect any unusual activity. This article further discusses this cyber incident in detail, including what techniques attackers are using as well as what organizations should be doing to detect abnormalities in their systems.

    CRN reports "Homeland Security Unit Warns Of Malware Campaign Targeting Critical Systems In The Manufacturing, Energy Sectors"

  • news

    Visible to the public "Internet Atlas maps the physical elements of the internet to enhance security"

    Researchers at University of Wisconsin- Madison have developed a detailed map that outlines the structure of the worldwide internet called the "Internet Atlas". This map considers physical elements not visible to the average user, but are crucial to the infrastructure of the internet. Elements include submarine cables buried underneath the ocean floor and distributed between continents to support communication as well as data centers containing many different types of data that are held within buildings around the world. This article further discusses the development of Internet Atlas along with how network performance and security is expected to improve with the help of this mapping.

    Homeland Security News Wire reports "Internet Atlas maps the physical elements of the internet to enhance security"

  • news

    Visible to the public "Attackers Unleash OAuth Worm via 'Google Docs' App"

    Security researchers have discovered a new "Google Docs" phishing campaign that attackers have launched to deceive Google users into logging in and granting permission for the application to access their account permissions. This phishing campaign quickly evolves into a worm if the fraudulent app is granted authorization by the user, allowing distribution to contacts. Although this attack was soon terminated by Google, about 1 million users may have still been affected. This article further discusses how the attack performs, details of the OAuth Worm, what cybercriminals behind this attack could do with the stolen information as well as the importance of users being cautious of what they click on.

    BankInfoSecurity reports "Attackers Unleash OAuth Worm via 'Google Docs' App"

  • news

    Visible to the public "Using Brainwaves to Guess Passwords"

    Security researchers reveal that a brain-wave-sensing headset by the name of "Epoc+", can be used to steal private data such as passwords and pins via brain interfaces. Manufactured by Emotiv, the Epoc+ is a headset device with attached electrodes, which are used to perform electroencephalography (EEG), detecting voltage variations in the outer layer of the brain. The main intents of this technology are to detect emotions and allow users to control robots with their thoughts. This article further discusses the uses of this technology, how researchers demonstrated the security risks that could arise with the use EEG headset technology, the motive behind this research, and Emotiv's response to this study.

    MIT Technology Review reports "Using Brainwaves to Guess Passwords"

  • news

    Visible to the public "Doing The Math For Better Encryption"

    Cybersecurity gets a boost in encryption innovation as scientists at the University of Texas introduce a new technique to generate random numbers, which requires less effort in computation than other methods. This approach on generating random numbers improves upon randomness extractors by mixing two weakly random sources to generate a statistically random sequence of numbers. This method is expected to produce several benefits beyond encryption. This article further discusses this innovative formula, the difficulty of generating random numbers for a computer, how the quality of randomness is measured, previous versions of randomness extractors, and how the mathematical method is expected to improve in the future.

    SIGNAL Magazine reports "Doing The Math For Better Encryption"

  • news

    Visible to the public "Robots Under Attack: Trend Micro Uncovers New Risks"

    According to new research conducted by Trend Micro and outlined in their report, "Rogue Robots: Testing the Limits of an Industrial Robot's Security", robotic manufacturing systems are extremely vulnerable to attacks as it has been revealed that 83,000 units are easily exposed via connection to the internet and poor authentication. This article briefly discusses what this research highlights, some points outlined within the report, as well as how attacks could be detected in robot devices.

    Infosecurity Magazine reports "Robots Under Attack: Trend Micro Uncovers New Risks"

    Rogue Robots: Testing the Limits of an Industrial Robot's Security

  • news

    Visible to the public "Using AI-enhanced malware, researchers disrupt algorithms used in antimalware"

    As many organizations and government foundations are being encouraged to embrace the future of artificial intelligence (AI) in the implementation and processes of cybersecurity, concerns of emerging machine learning-based malware arises. Researchers at Peking University's School of Electronics Engineering and Computer Science have published a research paper, "Generating Adversarial Malware Examples for Black Box Attacks Based on GAN", which discusses the components of "MalGAN", an algorithm used to produce adversarial malware examples and evade black-box machine learning-based detection models. This article discusses some points outlined in the research paper as well as how cybersecurity experts expect AI to benefit cybercriminals.

    TechRepublic reports "Using AI-enhanced malware, researchers disrupt algorithms used in antimalware"

  • news

    Visible to the public "Could a doodle replace your password?"

    Considering the growing percentage of Americans owning smartphones and the significant amounts of personal and private data that is being stored on these devices, one layer of security is not substantial enough for protecting all that data. This thin layer of security is the password that unlocks the smartphone's screen. Researchers have developed another authentication method that is expected to replace passwords, called "user-generated free-form gestures", which would allow owners to draw their own pattern on the screen instead of entering a password. This article discusses the comparison between this new method of authentication and biometric authentication methods, the capabilities and measurements within this new method, along with the expansion of this type of authentication to other platforms.

    The Conversation reports "Could a doodle replace your password?"

  • news

    Visible to the public "SOFA-B: Enabling organizations to measure the strength of biometric technologies"

    The National Institute of Standards and Technology (NIST) wants to create a framework for biometric authenticators with the development of the Strength of Function for Authenticators - Biometrics, or SOFA-B. This framework will help in measuring and comparing the strength of different biometric authenticators as well as other authenticator types such as passwords, tokens, and more. This article further discusses the goal behind SOFA-B, security components of this framework, and envisioned purposes for this framework in the future.

    SecureIDNews reports "SOFA-B: Enabling organizations to measure the strength of biometric technologies"

    More information on SOFA-B

  • news

    Visible to the public "Hackers using 'cybersquatting' tactics to spoof websites of UK's biggest banks"

    UK's most popular banks have been targeted in a scheme in which hackers use fake website domains to impersonate them, deceiving customers into revealing their personal details such as sensitive login credentials. Researchers at DomainTools, a cybersecurity firm, have found a significant number of fake websites posing as different financial firms and a selection of US-based retailers. Researchers have also revealed the method that hackers are using, known as "cybersquatting", which is the act of inexpensively purchasing website domains then designing each website to appear legitimate by displaying brand names and trademarked logos. This article further discusses the details of this hacking scheme, specific banking services that have been targeted, and suggestions for brands in handling domain name registrations.

    IBTimesUK reports "Hackers using 'cybersquatting' tactics to spoof websites of UK's biggest banks"

  • news

    Visible to the public "Study Links Flawed Online Tutorials with Vulnerable Open Source Software"

    A study conducted by German researchers reveal the correlation between the emergence of security vulnerabilities when developers copy and paste code into open source software, specifically if the code originates from flawed online tutorials. Though this study only focused on PHP code for Web projects, this discovery still brings attention to a serious problem within the open source community. This article further discusses how researchers demonstrated this finding as well as the tools they developed for this study.

    ADTmag reports "Study Links Flawed Online Tutorials with Vulnerable Open Source Software"

  • news

    Visible to the public "IEEE Standards Association Announces Initiative Designed to Protect Digital Identity for the Global Community"

    IEEE Standards Association has announced the launch of a new program called Digital Inclusion through Trust and Agency, which will focus on creating standards for the protection of consumer and patient data, specifically in consideration of identity and blockchain technology. This press release outlines the goals of this new initiative, which programs will be complemented by this new program, as well as which multi-disciplinary fields and sectors program members will represent.

    "IEEE Standards Association Announces Initiative Designed to Protect Digital Identity for the Global Community"

  • news

    Visible to the public "Intel Alert: Critical Security Flaw Affects Many Chipsets"

    Chipmaker Intel has released an alert for a critical security flaw within several of its non-consumer chipsets in which attackers could exploit through the operation of Intel's own remote-management tools. This raises serious security concerns as this vulnerability could be used as a doorway for attackers to install malware on user devices as well as infiltrate enterprise networks. This vulnerability has been revealed to be in conjunction with the management of privileges, which allows unprivileged attackers to gain access of controlling features offered by Intel products. This article further discusses the details of this flaw, recommendations from security experts, other discoveries made by security researchers, mitigation steps detailed by Intel, as well as the identification of devices with vulnerable firmware.

    GovInfoSecurity reports "Intel Alert: Critical Security Flaw Affects Many Chipsets"

  • news

    Visible to the public "New Dok Mac Malware Uses Nag Screens, Intercepts Encrypted Web Traffic"

    A new Mac malware dubbed "Dok" has been discovered by researchers from Check Point. Researchers reveal that this malware is mainly targeting German-speaking European users through a surge of spam emails. This malware utilizes Android-like nag screens to acquire admin privileges and funneling tactics to transmit traffic through a remote proxy. This article further discusses the details of Dok, capabilities and attributes of this malware, as well as how this malware performs as demonstrated by researchers.

    BleepingComputer reports "New Dok Mac Malware Uses Nag Screens, Intercepts Encrypted Web Traffic"

  • news

    Visible to the public "Hackers Steal, Release New Netflix 'Orange Is the New Black' Episodes"

    A hacker group by the name of "The Dark Overlord" leaked 10 episodes from the upcoming season of Netflix's original series Orange is the New Black after supposedly hacking a third-party partner on April 29. The hacker group claims to have demanded payment from Netflix using ransomware before leaking the episodes as the content distributor refused to pay. Netflix has released a statement to media outlets, stating that the security of a production vendor was compromised to perform this malicious act. This article further discusses details of this alleged ransomware attack on Netflix, the architecture and cloud platform utilized by Netflix, security of software supply chain, as well as the importance of shared responsibility and enforcement of security of all parties in a system.

    eWeek reports "Hackers Steal, Release New Netflix 'Orange Is the New Black' Episodes"

  • news

    Visible to the public  “‘World’s Most Secure’ Email Service Is Easily Hackable”

    Nomx is a startup company that claims to provide the most secure email service by offering a device, which could be used to set up a personal email server, avoiding connection with the naturally "vulnerable" mail exchange. Scott Helme, a security researcher, decided to challenge the claims of ensured security from Nomx by examining the device's true structure and process. Helme discovered numerous vulnerabilities within the software, which would allow anyone to hijack the device remotely if the user were to be tricked into visiting a malicious site. This malicious act is known as cross-site request forgery (CSRF). This article further discusses the vulnerabilities of Nomx's device, as well as the response of Will Donaldson, the CEO of Nomx, in regards to these flaws.

    Motherboard reports "'World's Most Secure' Email Service Is Easily Hackable"

  • news

    Visible to the public Pub Crawl #5

  • news

    Visible to the public "An Obscure App Flaw Creates Backdoors In Millions of Smartphones"

    Researchers at University of Michigan have shared their findings of hundreds of applications in Google Play having the capability of allowing a phone to act as a server as the owner connects to that phone from their PC. This capability raises major security risks as a great number of these applications leave insecure ports open on smartphones, which could be exploited by hackers to steal sensitive data or install malware. This article further discusses how researchers went about determining and demonstrating the scope of this port problem along with the identification of vulnerable popular apps.

    WIRED reports "An Obscure App Flaw Creates Backdoors In Millions of Smartphones"

  • news

    Visible to the public "Nondigital, analog theft is main driver in identity theft"

    New research from the Center for Identity at UT reveals that the leading sparks behind identity-related crimes surprisingly aren't correlated with mega-data breaches, but with traditional "analog" theft. This discovery has been outlined in the "2017 Identity Theft Assessment and Prediction Report", which reveal the processes of identity theft that criminals follow. Reports show that half of the identity theft incidents that occurred between the years of 2006 and 2016, were a result of vulnerabilities stemming from human error, not the exploitation of digital flaws. This article further discusses the findings of this research, including the common scope, origin, and targets behind identity theft cases.

    Phys.org reports "Nondigital, analog theft is main driver in identity theft"

  • news

    Visible to the public "Teen Hacker Sentenced Over 'Titanium Stresser' Attacks"

    Adam Mudd has been sentenced to two years in prison after he plead guilty to developing and selling a distributed denial-of-service attack tool by the name of "Titanium Stresser". Mudd was 16 years old when he developed this malicious tool that has been used to target multiple organizations such as Microsoft and Sony. Though Mudd has been arrested for the cybercrime he has committed, his work still remains impactful worldwide as this malicious tool has been used to launch more than 1.7 million DDoS attacks. This article further discusses the prosecution of Mudd, how his case was investigated, as well as the common origin of teen cybercrime offenders and how their skills could be guided toward legitimate activities.

    Data Breach Today reports "Teen Hacker Sentenced Over 'Titanium Stresser' Attacks"

  • news

    Visible to the public "New platform uses behavioral science to cut cyber security risks"

    British startup, CybSafe, has launched a cloud-based platform that delivers a security-based e-learning program personalized for the user through machine learning of user knowledge and behavior patterns. This service can be accessed through a mobile app or online. The motivation behind this new development is to reduce human error in cybersecurity by providing easy access to training and knowledge through personalized content, making learning as effective and engaging for the user as possible. This article discusses the goals of this platform, learning tools offered within this platform, as well as how this could be beneficial to businesses.

    BetaNews reports "New platform uses behavioral science to cut cyber security risks"

  • news

    Visible to the public "Advancing Cybersecurity with Blockchain Technology"

    Blockchain technology offers alternative approaches for managing, distributing, and sharing data to avoid massive data loss or damage in single point of failure systems. Blockchain technology features are classified into three components, which include protection from identity theft, ensuring data integrity by preventing the tampering of data, and stopping DDoS attacks from infiltrating and damaging centralized infrastructure. This article discusses what Blockchain technology provides beyond traditional endpoint protection, and how new alternatives offered by this technology would help in advancing cybersecurity with the three highlighted features.

    Nasdaq reports "Advancing Cybersecurity with Blockchain Technology"

  • news

    Visible to the public "Webroot deletes Windows files and causes serious problems for users"

    Users of endpoint security product, Webroot, are demanding major fixes and solutions for a huge problem that emerged on Monday, April 24, which flags valid and essential Windows OS files as malicious, leading to the blockage and quarantining of these files. This problem brings attention to the notable issue of false positives in the antivirus industry. This article further discusses this problem and its unusual activity, the solution provided by Webroot, and why this solution is insufficient for managed services providers.

    Network World "Webroot deletes Windows files and causes serious problems for users"

  • news

    Visible to the public "Phishing attacks using internationalized domains are hard to block"

    The latest version of Google Chrome tackles phishing by restricting how domain names made up of non-Latin characters are displayed by the browser as attackers were using a certain technique involving these characters to create highly convincing phishing websites. Internationalized domain names are converted into ASCII-compatible form then displayed with their non-Latin characters to billions of internet users through browsers that support Unicode, allowing users to read domain names in their native language. Though this process facilitates global internet usability, it also raises issues of security as some characters could be substituted for another set of characters from a different alphabet, matching in appearance. This technique can be used to spoof URLs and launch phishing attacks. This article further discusses how browsers perform checks on these types of malicious activity, how this malicious act was discovered and demonstrated, as well as how Google Chrome and other internet browsers are reacting to this issue.

    PCWorld reports "Phishing attacks using internationalized domains are hard to block"

  • news

    Visible to the public "New Strain of Linux Malware Could Get Serious"

    Linux/Shishiga is a new strain of Linux malware that is raising major concerns as it could transform into a dangerous widespread security threat. Researchers of this new strain of malware have revealed that it uses four different protocols, SSH, Telnet, HTTP and BitTorrent. Shishiga also utilizes Lua programming language as it offers more flexibility in modular design. This article discusses the process, similarity to other strains of Linux malware, structure, and potential evolution of Shishiga, as well as some strategies for protecting devices from the infection of Shishiga and other similar worms.

    TechNewsWorld reports "New Strain of Linux Malware Could Get Serious"

  • news

    Visible to the public "Stuxnet: The Computer Worm That Keeps on Living"

    Security researchers state that the Stuxnet worm flaw is still the most exploited despite Microsoft's release of a patch to fix this flaw seven years ago. According to Kaspersky Lab, the Windows Shell flaw responsible for the Stuxnet worm is still first in the ranks of exploits targeting users in 2015 and 2016, mainly because of the self-replicating feature possessed in this attack. This article further discusses why this exploit is so powerful as well as suggested mitigation of this exploitation.

    SecurityIntelligence reports "Stuxnet: The Computer Worm That Keeps on Living"

  • news

    Visible to the public "Experts Find 10 Flaws in Linksys Smart Wi-Fi Routers"

    Researchers at IOActive have discovered 10 vulnerabilities within Linksys routers that could be exploited by hackers to launch DoS attacks, expose and steal sensitive information, as well as configure malicious backdoors for future attacks. Linksys routers containing support for the Smart Wi-Fi feature were the focus of research and discovery. This article further discusses the malicious activity of attackers that could occur if these flaws were to be exploited and the vendor's reaction to this finding.

    SecurityWeek reports "Experts Find 10 Flaws in Linksys Smart Wi-Fi Routers"

  • news

    Visible to the public "APT Attack Activity Occurs at 'Low, Consistent Hum,' Rapid7 Finds"

    Security vendor, Rapid7, has a released a quarterly threat intelligence report, outlining analyses of encountered security incidents by customers, which were then handled and managed by the company's services. This report reveals that advanced persistent threats were less common for companies not in conjunction with nation-state interests and that such threats have not been an issue for most organizations in the first quarter of 2017. Organizations in alignment with government, manufacturing, aerospace, and other industries formed by nation-state interests were the most impacted by APT activity. This article further discusses the handling of APT attacks, other findings and analysis made by Rapid7, along with the issues of security monitoring in organizations.

    Dark Reading reports "APT Attack Activity Occurs at 'Low, Consistent Hum,' Rapid7 Finds"

    Rapid7 Threat Report 2017 Q1

  • news

    Visible to the public "Patched Flaw in Bosch Diagnostic Dongle Allowed Researchers to Shut Off Engine"

    Researchers at Argus Cyber Security, a firm dedicated to researching automobile security, has discovered two vulnerabilities within Bosch's Drivelog Connect OBD-II dongle and the smartphone app that would allow the engine of a vehicle to be shut off or disabled by hackers. These vulnerabilities can be exploited to send malicious messages to the Controller Area Network bus, which manages the communication between the vehicle's controllers and devices. This article further discusses the functionalities of the dongle device, how the connection between the dongle device and an app would allow this hack to be performed, BOSCH's intent to improve security, as well as the risk of third-party connections to vehicle systems.

    Threatpost reports "Patched Flaw in Bosch Diagnostic Dongle Allowed Researchers to Shut Off Engine"

  • news

    Visible to the public SoS Musings #2 - Empirical Research

    The Thinker, wire bodySoS Musings #2

    Empirical Research

  • news

    Visible to the public Pub Crawl #4

  • news

    Visible to the public Cyber Scene #9 - Private Sector Cyber Voices Speak as Congressional Committees Move to Closed Sessions

    Cyber Scene

    Cyber Scene is intended to provide an informative, timely backdrop of events, thinking, and developments that feed into technological advancement of SoS Cybersecurity collaboration and extend its outreach.

  • news

    Visible to the public "Lightbend to offer security analysis for Scala through HPE Security Fortify integration "

    Lightbend, the providing company of the Scala programming language and the Reactive application development platform for developing distributed systems, has recently announced its collaboration with HPE Security Fortify to further improve the Scala programming language. This partnership will advance efforts in developing static analysis security testing capabilities for the Scala programming language. This article discusses the rapid growth of the Scala language in the building of distributed applications designed to support performance and reliability for microservices and Fast Data services, as well as the importance of secure programming.

    SD Times reports "Lightbend to offer security analysis for Scala through HPE Security Fortify integration "