News Items

  • news

    Visible to the public "100,000-Strong Botnet Built on Router 0-Day Could Strike at Any Time"

    The latest variant of Mirai malware has been discovered to be using a more sophisticated approach than other versions that have released since the botnet's source code was openly published. This new strain of Mirai is significant as it can infect two commonly used lines of Huawei routers through the exploitation of a recently discovered zero day vulnerability, despite the use strong passwords and deactivation of remote administration. An army of 100,000 internet-connected devices has been built by the launch of this advanced new strain of Mirai malware. This article further discusses the approach used by the latest Mirai variant, how the botnet operator could use the compromised devices, and what is being done to stop the botnet.

    Ars Technica reports "100,000-Strong Botnet Built on Router 0-Day Could Strike at Any Time"

  • news

    Visible to the public “Phishing Schemes Are Using Encrypted Sites to Seem Legit”

    A report sent out on Tuesday by research and defense firm PhishLabs shows that the use of HTTPS by attackers has increased exponentially with the push of website encryption by companies like Google. While the website encryption unnecessary for the attackers to complete their tasks, the report shows that with it consumers are more likely to give up their information. This article further discusses the results of the analysis performed by PhishLabs, why phishers are so successful using HTTPS, and how consumers can protect themselves.

    Wired reports "Phishing Schemes Are Using Encrypted Sites to Seem Legit"

  • news

    Visible to the public "Enterprises Must Evolve Beyond Two-Factor Authentication to Secure Verification"

    Sridhar Muppidi, IBM Security Systems' chief technology officer for identity and access management solutions, emphasizes the importance of advancement beyond two-factor authentication (2FA) as it not the ultimate solution for the verification of identities. Enterprises are encouraged to improve upon their authentication processes through the utilization of alternative methods. This article further discusses how 2FA could be exploited by attackers, alternative authentication methods, a recent development in 2FA, and ways in which companies should improve verification methods.

    Security Intelligence reports "Enterprises Must Evolve Beyond Two-Factor Authentication to Secure Verification"

  • news

    Visible to the public “CyberX Security Researchers Demonstrate How to Jump the ICS/SCADA Air Gap at Black Hat Europe 2017”

    Security researchers at CyberX, a leading ICS security vendor, will demonstrate an attack in which Programmable Logic Controllers (PLCs) are targeted in order to jump the industrial control system (ICS) air gap and exfiltrate confidential information. This demonstration rejects the notion that air-gapped networks are invulnerable to targeted attacks. This article further discusses the demonstration of this attack that will be performed by CyberX researchers at Black Hat Europe 2017, why PLCs are targeted rather than PC-based systems in this attack, the susceptibility of air-gapped networks to targeted attacks by persistent adversaries, other findings shared by CyberX in relation to ICS networks, and suggestions for defending against targeted ICS attacks.

    PR Newswire reports "CyberX Security Researchers Demonstrate How to Jump the ICS/SCADA Air Gap at Black Hat Europe 2017"

  • news

    Visible to the public "Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches"

    According to Saurabh Harit, researcher at Spirent SecurityLabs, vulnerabilities within devices such as the IV infusion pump and the digital smart pen could lead to an extensive data breach upon exploitation by hackers. Research conducted on the security of digital smart pens and the IV infusion pump used in healthcare organizations to prescribe and administer medication, reveals the processes at which flaws within such devices could be exploited by hackers, as well as the information that could be exposed. This article further discusses the uses of these devices, how such devices could be attacked in order to gain access to sensitive patient information, and how perpetrators can use this information.

    Dark Reading reports "Hacked IV Pumps and Digital Smart Pens Can Lead to Data Breaches"

  • news

    Visible to the public Pub Crawl #11

  • news

    Visible to the public "Game Theory Harnessed for Cybersecurity of Large-Scale Nets"

    Research being led by Purdue University in collaboration with Sandia National Laboratories aims to improve upon the cybersecurity of large-scale systems such as power grids, autonomous military defense networks, industrial control systems, consumer credit report agencies, and more, by using a concept of game theory, which is the Nash Equilibrium. Understanding of vulnerabilities that emerge within large-scale interconnected systems as well as the implementation of security into the design of such systems will be enhanced through this research. In addition, the complexities of human decision making when dealing with security risks will also be explored. This article further discusses the goals, parts, and support of this project, along with the decision-making processes that surround the implementation of cybersecurity.

    Phys.org reports "Game Theory Harnessed for Cybersecurity of Large-Scale Nets"

  • news

    Visible to the public "HADES Misleads Hackers by Creating an Alternate Reality"

    Cyber researchers at Sandia National Laboratories are applying deceptive strategies in defending systems from hackers through the use of a recently patented alternative reality by the name of HADES (High-fidelity Adaptive Deception & Emulation System). Instead of obstructing or removing a hacker upon infiltration into a system, HADES leads them to a simulated reality in which cloned virtual hard drives, data sets, and memory that have been inconspicuously altered, are presented. This article further discusses the process of HADES, the use of deception in the performance of cyber defense, what this technique has allowed researchers to do, the research behind HADES, modes in which this system can operate, and the limitations of this system.

    Homeland Security News Wire reports "HADES Misleads Hackers by Creating an Alternate Reality"

  • news

    Visible to the public "75% of Insider Breaches Are Accidental"

    According to the Q3 GTIC Quarterly Threat Intelligence Report released by NTT Security, a majority of insider threats stem from accidental or negligent activities. Organizations can be at significant risk due to insider threats without being aware. This article further discusses insider threats faced by organizations, the potential consequences of not having a cybersecurity plan in place to mitigate such threats, and other key findings of the report.

    Help Net Security reports "75% of Insider Breaches Are Accidental"

  • news

    Visible to the public "Report Finds Millions of Insecure Devices in European Cities"

    According to a report released by Trend Micro, millions of smart-home gadgets within European cities have been discovered by researchers to be highly vulnerable to cyberattacks. Cities such as Berlin and London are highlighted as they contain the most vulnerable devices. This significant discovery was made by researchers through the use of Shodan, which is a search engine that lets users find devices connected to the internet. This article further discusses the potential impacts of searchable exposed devices, the importance of implementing security into the design of such devices, and recent attacks on IoT devices.

    CNET reports "Report Finds Millions of Insecure Devices in European Cities"

  • news

    Visible to the public "Traveling This Holiday Season? Beware of RFID Attacks"

    Radio-frequency identification (RFID) is a technology that is commonly exploited by malicious criminals as it used for payment and access control in consumer and business operations. Malicious actors seek to capitalize on RFID attacks by accessing areas in which there is acquirable property. This article further discusses the uses of RFID, specific cases of RFID attacks, media coverage of RFID attacks, RFID hacks, and best practices for mitigating RFID attacks.

    Security Intelligence reports "Traveling This Holiday Season? Beware of RFID Attacks"

  • news

    Visible to the public “Google AI Lets Phone Owners Know About Shoulder Surfers”

    Google researchers, Hee Jung Ryu and Florian Schroff, have demonstrated the use of a machine-learning and facial recognition system that they have developed to detect shoulder surfers. This system by the name of "Electronic Screen Protector with Efficient and Robust Mobile Vision" can be used by phone owners to catch those who are trying to take a peek at their phone screen. This article further discusses the demonstration of this system and how the privacy of mobile device owners could be improved with the use of this application.

    Naked Security reports "Google AI Lets Phone Owners Know About Shoulder Surfers"

  • news

    Visible to the public “New Nanoscale Security Method May Be The Best Hacking Prevention”

    Researchers at the New York University Tandon School of Engineering have introduced a new method that could be used to inexpensively provide maximum security against hacking. This method uses a new class of Cryptographic primitives made of nanomaterial that was grown by researchers in multiple layers. The highest possible level of structural randomness is achieved by nanomaterial, which is essential in the creation of security primitives as randomness allows such primitives to perform encryption and physically provide security for computer hardware and data. This article further discusses the details of this new nanoscale security method and the predicted future of nanomaterial-based security primitives.

    IBT reports "New Nanoscale Security Method May Be The Best Hacking Prevention"

  • news

    Visible to the public Cyber Scene #15 - Cyber Tuesday

    Cyber Scene #15

    Cyber Tuesday

    Regs and Rulers

  • news

    Visible to the public "Uber Admits It Hid Massive Data Breach of 57M Users and Drivers"

    Uber has recently admitted that it faced a massive data breach in late 2016, which exposed personally identifiable information belonging to 56 million users and 600,000 drivers. Information exposed by this breach includes names, email addresses, phone numbers, and license numbers. This article further discusses the details of this breach in relation to how it occurred, information that was exposed, the actions taken by Uber in response to this breach, and the bug bounty program launched by Uber to discover other vulnerabilities.

    eWeek reports "Uber Admits It Hid Massive Data Breach of 57M Users and Drivers"

  • news

    Visible to the public "'Hundreds' Of Websites Track User Keystrokes"

    A study conducted by Princeton University alleges the use of session replay scripts by more than 480 websites to record each visitor's keystrokes, which would then be sent to third-party servers. In addition to keystrokes, these session replay scripts also record information such as mouse movements, scrolling behavior, and more. The information gathered by these scripts does not exclude personally identifiable user information, which significantly raises the risks of identity theft, scams, and other attacks. This article further discusses the discoveries made in this study and online privacy.

    Silicon UK reports "'Hundreds' Of Websites Track User Keystrokes"

  • news

    Visible to the public "How Quantum Computing Could Create Unbreakable Encryption and Save the Future of Cybersecurity"

    In the latest issue of Science Advances, researchers at Duke University, The Ohio State University, and Oak Ridge National Laboratory, have announced a new breakthrough in quantum computing in which they have significantly increased the speed of quantum key distribution (QKD) transmission. QKD uses particles of light known as photons to encode data in quantum bits, which are transmitted to a sender and receiver in the form of an encryption key. This article further discusses the increased speed of QKD transmission by researchers, the concept of QKD, and its contribution to cybersecurity.

    TechRepublic reports "How Quantum Computing Could Create Unbreakable Encryption and Save the Future of Cybersecurity"

  • news

    Visible to the public "Mobile Malware a Universal Threat Around the Globe: Check Point"

    Findings shared within the recent Check Point Mobile Threat Research Report reveals that no company is completely safe from mobile malware as an overwhelming majority of the 850 organizations worldwide have faced at least one mobile attack in the last year. Another finding reveals the use of at least one jailbroken iOS or rooted Android device by most companies, which raises concerns as the associated processes of jailbreaking and rooting, remove essential built-in security. This article further discusses the findings shared by the report in relation to the use of rooted or jailbroken mobile devices, the most targeted sectors by mobile malware attacks, the types of mobile attacks faced by different sectors, the distribution of mobile malware attacks throughout the three regions studied, and the predicted increase of mobile attacks.

    SC UK reports "Mobile Malware a Universal Threat Around the Globe: Check Point"

  • news

    Visible to the public 2018 Workshop on Modeling and Simulation of Cyber-Physical Energy Systems: 10 April 2018, Porto, Portugal

    Dear Colleagues,

    It is my pleasure to invite you to the upcoming Workshop on Modeling and Simulation of Cyber-Physical Energy Systems!

    http://www.palensky.org/mscpes/2018

    After Berkeley, Berlin, Seattle, Vienna, and Pittsburgh, we are this time in beautiful Porto, Portugal, again co-located with the annual Cyber-Physical Systems Week.

    Full paper submission deadline is 4th February 2018. Accepted and presented papers will be submitted to IEEE Xplore digital library.

  • news

    Visible to the public "Creating ATM Botnets Not Difficult, Researchers Say"

    According to Kaspersky Lab researchers, Olga Kochetova and Alexey Osipov, automated teller machines (ATMs) often run outdated and flawed software, which significantly increases their vulnerability to cyber and physical attacks. The vulnerability of these machines could not only allow an attacker to extract cash, but also compromise a bank's entire network of ATMs. This article further discusses how the vulnerability of ATMs arises and ways in which malicious actors could infiltrate ATM networks.

    Security Week reports "Creating ATM Botnets Not Difficult, Researchers Say"

  • news

    Visible to the public “Windows 10 Security Feature Broken, CERT/CC Warns”

    CERT/CC has recently revealed a flaw in the Windows operating system, affecting users of Windows 8, 8.1, and 10. The flaw is based in a feature known as ASLR (address space layout randomization), which helps prevent attacks such as code-reuse and return-oriented programming attacks that may allow attackers to take control of a device. This article discusses ASLR, how it works in Windows, and how administrators can fix the problem using existing Windows software while waiting for a security patch.

    GovInfo Security reports "Windows 10 Security Feature Broken, CERT/CC Warns"

  • news

    Visible to the public "Worried About Hackers, States Turn to Cyber Insurance"

    As the severity of cyberattacks continues to grow, states are increasingly making use of cyber insurance for protection. Cyber insurance policies are meant to cover the massive losses and expenses faced by states in the event that their computer networks are hit by cyberattacks. The cost of performing a number of crucial activities following the event of a cyberattack is also covered by such policies, which include investigating, restoring data, alerting victims, credit monitoring, and more. This article further discusses specific cases in which cyber insurance has been purchased and used by states, along with the growing cyber insurance market.

    GovTech reports "Worried About Hackers, States Turn to Cyber Insurance"

  • news

    Visible to the public "Intel Chip Flaws Leave Millions of Devices Exposed"

    Critical flaws have been discovered within the Intel Management Engine (ME), Intel Trusted Execution Engine (TXE), and Server Platform Services (SPS). The ME is a subsystem that runs independently within the Intel chipset, which enables management functions such as administering updates, troubleshooting, and more to be done remotely by administrators. The exploitation of vulnerabilities within the ME poses significant threats as this subsystem has access and command over the main system processors. This article further discusses the concerns that have been surrounding ME, as well as the significant threats and potential level of impact posed by these newly disclosed flaws.

    Wired reports "Intel Chip Flaws Leave Millions of Devices Exposed"

  • news

    Visible to the public "NHS Needs to Develop Cyber-Sec Culture to Reap Benefits of Digitisation"

    The results of a survey conducted by Palo Alto in collaboration with Vanson Bourne, have revealed the beliefs of National Health Service (NHS) IT managers in regards to cybersecurity in the NHS. The survey touched upon subjects of data security, cybersecurity training in support of developing a strong cybersecurity culture within the NHS, the level of trust that patients have in how the NHS manages their data, and GDPR compliance. This article further discusses the findings of this survey, along with how the prioritization of cybersecurity in the NHS could improve upon patient healthcare.

    SC US reports "NHS Needs to Develop Cyber-Sec Culture to Reap Benefits of Digitisation"

  • news

    Visible to the public  “Four Methods Hackers Use to Steal Data from Air-Gapped Computers”

    Security researchers have demonstrated ways in which data could be extracted from air-gapped computer systems through the development of covert channels. These channels are characterized into 4 different types, which include electromagnetic, acoustic, thermal, and optical. This article further discusses how hackers could abuse these channels to steal data, the insecurity of light-emitting diodes (LEDs), and other related research.

    ZDNet reports "Four Methods Hackers Use to Steal Data from Air-Gapped Computers"

  • news

    Visible to the public "Chemist Proposes 'Sweaty Analysis' to Better Secure Electronics"

    Jan Halamek, an assistant chemistry professor at the University at Albany, has released a new concept paper in which he focuses on cybersecurity and the use of sweat analysis as a new method of biometric authentication. The proposed approach for unlocking electronics, analyzes sweat to build a unique amino acid profile that would be stored within the device and used to identify its owner upon attempted unlocking. This article further discusses the details of this new biometric-based authentication method, the research behind this approach, and the inadequacy of current forms of authentication.

    R&D Magazine reports "Chemist Proposes 'Sweaty Analysis' to Better Secure Electronics"

  • news

    Visible to the public "Bugcrowd: Young Cybersecurity Professionals Are Turning to Bug Hunting"

    An annual report released by Bugcrowd titled, "Inside the Mind of a Hacker 2.0", shares findings in relation to the bug hunting community. The report reveals that there has been a considerable increase of participants in bug bounty programs from 2016. Another finding reveals a significant increase of younger bug hunters ranging from ages 18 to 29, most of which have earned some form of higher education. This article further discusses the findings shared within this report in pertinence to the demographics and motives of the bug hunting community, along with the importance of increased cybersecurity talent.

    SD Times report "Bugcrowd: Young Cybersecurity Professionals Are Turning to Bug Hunting"

  • news

    Visible to the public "Hacking Blockchain with Smart Contracts to Control a Botnet"

    Security researcher, Majid Malaika, has warned of the possible abuse of Blockchain technology to enable the creation of a powerful new form of botnet. The attack method that has been named "Botract", abuses code that runs on a blockchain known as a smart contract. A smart contract that is specifically written to allow the command and control for a botnet would significantly increase the resiliency of the botnet application. This article further discusses how Botract works, the flaw within the blockchain smart contract model that enables this attack method to work, and the purpose of this research.

    eSecurity Planet reports "Hacking Blockchain with Smart Contracts to Control a Botnet"

  • news

    Visible to the public "What Makes Hackers Tick?"

    Researchers at Sandia National Laboratories will conduct a study funded by the U.S. Department of Defense, in which the physical and mental responses of hackers are measured as they perform attacks. In the study, hackers will wear body monitoring equipment to measure their heart rate and other biological responses as they compete to compromise computers within a simulated network. The goal of this study is to determine the most secure configurations by discovering the level of difficulty faced by hackers in the infiltration of certain hardware and software, as well as how they cope with the challenge. This article further discusses the goal of the study, the body monitoring technology that would be used in this study, as well as the support behind this research.

    GCN reports "What Makes Hackers Tick?"

  • news

    Visible to the public "Cyber Discovery Program Aims to Encourage More Teens into Industry"

    In an attempt to address the skills gap within the cybersecurity field, the U.K. government has launched the Cyber Discovery program. This program has been delivered by SANS Institute, BT, FutureLearn, and Cyber Security Challenge U.K. to find teenagers ranging from ages 14 to 18 that have the potential to flourish in the field of cybersecurity. The program offers a robust curriculum, which covers topics such as cryptography, programming, defense against attacks, and more. This article further discusses the details of the program in relation to its structure and goals, along with the importance of cultivating the cybersecurity skills of the next generation.

    Infosecurity Magazine reports "Cyber Discovery Program Aims to Encourage More Teens into Industry"

  • news

    Visible to the public "Companies Turn to War Games to Spot Scarce Cybersecurity Talent"

    An annual U.K. cybersecurity competition aims to help address the severe workforce shortage within the cybersecurity job market by raising awareness and encouraging the pursuance of careers in the cybersecurity field. The Cyber Security Challenge U.K., provides a series of games in which participants can assess their cybersecurity skills. Players who achieve high scores are invited to participate in regional competitions. Top performers within the regional competitions are asked to further participate in a masterclass and a team-based competition. As finalists show promise in successfully applying their skills, they are usually hired into cybersecurity jobs following the completion of the challenge. This article further discusses the details of the competition in pertinence to its goals, support, development, practices, and results.

    Bloomberg reports "Companies Turn to War Games to Spot Scarce Cybersecurity Talent"

  • news

    Visible to the public "Boeing 757 Testing Shows Airplanes Vulnerable to Hacking, DHS Says"

    A demonstration performed by Robert Hickey, an aviation program manager within the Cyber Security Division of the DHS S&T Directorate and his team of experts, reveals the possibility of remotely hacking a commercial aircraft. The aircraft used in the demonstration was a Boeing 757, which was proven to be vulnerable to hacking as researchers were able to successfully access its systems via radio frequency communications. This article further discusses the suggested focus on aircraft cyber infrastructure, the costs of resolving cyber vulnerabilities within the systems used by aircrafts, and the inadequacy of airplane cybersecurity.

    Avionics reports "Boeing 757 Testing Shows Airplanes Vulnerable to Hacking, DHS Says"

  • news

    Visible to the public "6 Steps for Sharing Threat Intelligence"

    Industry experts have emphasized six essential steps that organizations should take in order to improve upon the sharing of threat intelligence. Organizations must understand their event data before sharing, optimize the use of event data intelligence through the utilization of proper tools, exchange data with peers with the use of a system in which the relation of event data to other organizations can be viewed before sharing, and more. This article further discusses ways in which organizations can efficiently share threat intelligence.

    Dark Reading reports "6 Steps for Sharing Threat Intelligence"

  • news

    Visible to the public “Transparency of Machine-Learning Algorithms Is a Double-Edged Sword”

    Starting on May 25, 2018, the European Union's General Data Protection Regulation (GDPR) will be in full force. The set of rules to be enforced by the GDPR seek to protect the privacy of data, while giving EU residents a significant amount of control over their personal data as well as a better insight into how such data is being managed by organizations. One of the requirements that organizations are expected fulfill is the providing of adequate information to users, pertaining to the automated systems used to process their data. However, a challenge arises as such systems often depend on machine learning. The exact reasoning behind decisions made through the use of machine learning models is difficult to fully understand and explain, which poses a risk of non-compliance. This article further discusses the difficulty in understanding the decision-making process of machine learning systems and whether the transparency of machine learning is a need or a threat.

    WeLiveSecurity reports "Transparency of Machine-Learning Algorithms Is a Double-Edged Sword"

  • news

    Visible to the public “Phishing Biggest Threat to Google Account Security”

    Phishing remains one of the most prominent and successful attacks, targeting users in a variety of ways designed to gain access to their online credentials such as login information, credit card data and more. Researchers at both University of California Berkley and Google have written a research paper comparing the amount of account information on the black market with the tools available to gain account information in a time period from March 2016 to March 2017. The end result provided shows that phishing still presents a greater risk above keyloggers and data breaches. This article further discusses the data analysis given by Google and UC Berkley, and the overall risk it presents to users.

    Threatpost reports "Phishing Biggest Threat to Google Account Security"

  • news

    Visible to the public "New University Research Warning over Voice Recognition Biometric Security"

    A study conducted by researchers at the University of Eastern Finland reveals the inadequacy of voice recognition systems. According to researchers, voice recognition systems could be tricked by cyber criminals with the use of a number of different technologies such as voice conversion, speech synthesis, and more. Those who have a talent in impersonating voices could also deceive such systems. This article further discusses the study on voice recognition systems along with the current state of biometric security and the use of fraud detection technology.

    Computing reports "New University Research Warning over Voice Recognition Biometric Security"

  • news

    Visible to the public SoS Musings #8 - Need for Scientifically Backed Security

    SoS Musings #8

    Need for Scientifically Backed Security

  • news

    Visible to the public "Resilience to Phishing Attacks Is Failing to Improve"

    Phishing continues to be the most used tactic by attackers in launching targeted attacks, as it exploits the psychological weaknesses of humans. Studies show that an overwhelming majority of cyberattacks are initiated by the clicking of an email. This article further discusses the frequent use of spearphishing tactics in APT campaigns, why users often fall victim to these types of attacks, the importance of behavioral conditioning in preventing phishing attacks, and what other research pertaining to phishing reveals.

    ZDNet reports "Resilience to Phishing Attacks Is Failing to Improve"

  • news

    Visible to the public "Rise and Evolution of Ransomware Attacks​"

    Ransomware has significantly grown in strength and frequency as shown by the recent widespread outbreaks of WannaCry and Petya attacks. In order for enterprises to become better prepared in the battle against ransomware, they must be aware of the different types of ransomware that can be launched by attackers. This article further discusses five types of ransomware including encrypting ransomware, non-encrpyting ransomware, leakware, mobile ransomware, and wiper ransomware, along with the future of ransomware.

    Help Net Security reports "Rise and Evolution of Ransomware Attacks"

  • news

    Visible to the public "Homeland Security team remotely hacked a Boeing 757"

    Robert Hickey, an aviation program manager within the Cyber Security Division of the DHS S&T Directorate, has revealed a demonstration that was performed over a year ago in which a Boeing 757 was remotely hacked by him and his team of experts. The remote hack was performed by accessing the airplane's radio frequency communications. This article further discusses the cybersecurity concerns that have been surrounding commercial airliners due to their increasing interconnectivity as well as another vulnerability that would allow an attacker to control an airliner via an Android app.

    CSO Online reports "Homeland Security team remotely hacked a Boeing 757"

  • news

    Visible to the public “‘Eavesdropper’ Vulnerability Exposes Millions of Private Conversations”

    Security researchers have discovered a vulnerability, which can be exploited by attackers to gain access to millions of user conversations and SMS messages sent by applications that use the Twilio service. The "Eavesdropper" vulnerability arises from the presence of API credentials that have been hardcoded into these applications by developers. These credentials can be extracted by attackers to access call records, audio recordings, text messages, and more. This article further discusses the discovery of this vulnerability, the cause of this flaw, and types of applications that have been affected.

    Bleeping Computer reports "'Eavesdropper' Vulnerability Exposes Millions of Private Conversations"

  • news

    Visible to the public “Can Biology Show Us How to Stop Hackers?”

    ASU Now interviewed Stephanie Forrest, who is the director of ASU Biodesign Institute Center for Biocomputing, Security and Society, as well as a professor in the School of Computing, Informatics and Decision Systems Engineering. Forrest discussed how the observation of biological systems can inspire the development of novel methods in the process and implementation of cybersecurity. This article presents an interview in which Forrest discussed how mechanisms and principles used by biological systems can help shape approaches to cybersecurity problems, along with her thoughts on the scope of data breaches, the vulnerability of current computer systems to hacking, and cybersecurity challenges that will arise in the near future.

    ASU Now reports "Can Biology Show Us How to Stop Hackers?"

  • news

    Visible to the public “Hackers Claim to Defeat iPhone X 'Face ID' Authentication”

    Security researchers at Bkav, an information security firm based in Vietnam, claim to have defeated the facial-recognition system used to authenticate users of Apple's newest iPhone. Researchers have carefully crafted a mask with the use of 3D printing, 2D images, makeup, and handmade silicon to trick the Face ID feature offered by iPhone X. This article further discusses the creation of the mask, the likelihood of this threat, and what the results of this research indicates about the current state of biometric security.

    infoRisk Today reports "Hackers Claim to Defeat iPhone X 'Face ID' Authentication"

  • news

    Visible to the public "The Pentagon Opened Up to Hackers—And Fixed"

    The execution of the first ever federal bug bounty program by the name of "Hack The Pentagon" showed promising results as multiple vulnerabilities within certain public-facing DoD websites were able to be resolved. The discovery of these security vulnerabilities was a result of the welcoming of security researchers to find such flaws. This article further discusses other bug bounty programs launched by the DoD, along with the concerns and challenges surrounding such programs.

    Wired reports "The Pentagon Opened Up to Hackers--And Fixed"

  • news

    Visible to the public "The Challenge of Authenticating Real Humans in a Digital World"

    Authentication is a major part of our everyday lives as we use various forms of identification such as driver's licenses, ID cards, passwords, passcodes, and more to prove our identities offline and online. Although the process of authentication is becoming easier through the use of fingerprint readers, facial recognition systems, and other forms of biometric authentication technologies, there are still challenges pertaining to the digital authentication of an analog human's identity. This article further discusses three main ways of proving the identity of an individual human being, the potential impacts of digital authentication on security, and future complications associated with advanced authentication.

    Homeland Security News Wire reports "The Challenge of Authenticating Real Humans in a Digital World"

  • news

    Visible to the public “Experts Find Faster Way to Exploit Infineon Chip Crypto Flaw”

    Over the weekend, two researchers by the names of Daniel J. Bernstein and Tanja Lange were able to reproduce an attack that exploited a known flaw in Infineon Technologies RSA chips called CVE-2017-15361, also know as ROCA (Return of the Coppersmith Attack). This flaw was initially discovered in 2016 after research about it was shared. This article discusses the impacts and cost of exploiting the vulnerability.

    Security Week reports "Experts Find Faster Way to Exploit Infineon Chip Crypto Flaw"

  • news

    Visible to the public “Extortion-Based Cyber Attacks: the Next Evolution in Profit-Motivated Attack Strategies”

    Cyberattacks are expected to become significantly more devastating for companies in the coming year. As companies are increasingly taking action to defend against cyberattacks, attackers are expected to take on more volatile methods of launching such attacks in order to receive higher profits. This article further discusses the expected increase in the destructiveness of cyberattacks, tactics that are predicted to be used more by cyber criminals, and ways in which companies can prepare to prevent these highly destructive forms of attacks.

    Help Net Security reports "Extortion-Based Cyber Attacks: the Next Evolution in Profit-Motivated Attack Strategies"

  • news

    Visible to the public "Shape Security Introduces BlackFish AI to Combat Credential Stuffing"

    Shape Security has recently released its BlackFish AI technology aimed at helping organizations detect credential stuffing attacks. Attackers perform credential stuffing by using stolen account credentials derived from data breaches to access accounts on other sites. The process of credential stuffing makes use of various automated injection tools. This article further discusses the method of credential stuffing, BlackFish AI technology and its use of the bloom filter approach.

    eWeek reports "Shape Security Introduces BlackFish AI to Combat Credential Stuffing"

  • news

    Visible to the public "Researchers Unveil Tool to Debug 'Black Box' Deep Learning Algorithms"

    Self-driving cars operate through the use of deep learning systems. Deep learning is a form of machine learning that uses layers of artificial neurons in an attempt to mimic the processing and merging of information performed by the human brain. Although this technology has improved significantly in the development of intelligence, increased automation of tasks still raise concerns pertaining to safety, security, and ethics. A tool by the name of DeepXplore has been developed by researchers at Columbia and Leigh universities to perform automatic error-checking of neurons within deep learning neural networks used by self-driving cars to uncover deficient reasoning by clusters of neurons, malware masqueraded as harmless code in anti-virus software, and more. This article further discusses the concerns surrounding deep learning systems, the DeepXplore tool, and other methods of debugging the neural networks in self-driving cars.

    EurekAlert! reports "Researchers Unveil Tool to Debug 'Black Box' Deep Learning Algorithms"

  • news

    Visible to the public "Many Brother Printers Vulnerable to Remote DoS Attacks"

    Researchers at Trustwave have warned of an unpatched vulnerability that would allow attackers to remotely disable Brother printers temporarily with the generation of DoS attacks. The vulnerability arises from an embedded HTTP Daemon (HTTPd) server by the name of Debut, which is used by some Brother products to host web interfaces. This flaw could potentially impact thousands of Brother printers. This article further discusses how this flaw could be exploited by attackers, impacts of this exploitation, other companies whose printers have been discovered to be susceptible to DoS attacks, and the potential dangers of DoS attacks that are often overlooked.

    Security Week reports "Many Brother Printers Vulnerable to Remote DoS Attacks"