Thread
Stories related to "Buckeye (cyber espionage group linked to China) was using NSA hacking tools at least a year before the Shadow Brokers leak" across the full archive.
FAQ: https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf
Hey folks,
I've created a LinkedIn group for Lobsters users to help make connections, post about their availability for employment, and find interesting coworkers:
https://www.linkedin.com/groups/8646069
If you have an account, you are welcome to join and post. Please do kibitz my first dra...
First study to indicate a direct relationship between inbreeding and facial morphology. The “Habsburg jaw,” a facial condition of the Habsburg dynasty of Spanish and Austrian kings and their wives, can be attributed to inbreeding, according to new results published in the Annals of Human...
Your Car May Be Vulnerable to Cyberattacks – Even the Smartest of Smart Cars Have Issues
(scitechdaily.com)
The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself. New research from Michigan State University is the first to apply criminal justice theory to smart vehicles, revealing cracks in the current system le...
World’s Most Popular Websites’ Inconsistent and Misleading Password Advice Could Increase Risk of Cyber Attacks
(scitechdaily.com)
Password meters are frequently made available to help users secure their personal data against the threats posed by cybercriminals. However, the ‘inconsistent and misleading’ advice offered on some of the world’s most popular websites could actually be doing more harm than good, ac...
Does the common stereotype for “organized crime” hold up for organizations of hackers? Research from Michigan State University is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of har...
Laboratory tests of talc-based cosmetics products, commissioned by the Environmental Working Group, found asbestos — a deadly human carcinogen for which there is no safe level of exposure — in almost 15 percent of samples. The analysis, published today in the journal Environmental Health Insights, c...
An end-to-end cyber-biological attack, in which unwitting biologists may be tricked into generating dangerous toxins in their labs, has been discovered by Ben-Gurion University of the Negev cyber-researchers. According to a new paper just published in Nature Biotechnology, it is currently believed t...
New model shows why countries that retaliate too much against online attacks make things worse for themselves. During the opening ceremonies of the 2018 Winter Olympics, held in PyeongChang, South Korea, Russian hackers launched a cyberattack that disrupted television and internet systems at the gam...
Bitcoin and Ethereum exhibited a significant volatility increase five days post-incident, pointing to delayed risk pricing. These findings reveal inefficiencies in crypto markets and the need for deeper investigation into cyber-related financial risks. A University of Vaasa researcher, Klaus Grobys,...
Cybersecurity Researchers Build a Better “Canary Trap” – Using AI to Generate Fake Documents
(scitechdaily.com)
A New Artificial Intelligence System Generates Fake Documents To Fool Adversaries During World War II, British intelligence agents planted false documents on a corpse to fool Nazi Germany into preparing for an assault on Greece. “Operation Mincemeat” was a success, and covered the actual...
National Cyber Defense Is a “Wicked” Problem: Why the Colonial Pipeline Ransomware Attack and the SolarWinds Hack Were All but Inevitable
(scitechdaily.com)
Takeaways: There are no easy solutions to shoring up U.S. national cyber defenses. Software supply chains and private sector infrastructure companies are vulnerable to hackers. Many U.S. companies outsource software development because of a talent shortage, and some of that outsourcing goes to compa...
New Technology That Can Block Cyberattacks From Impacting the Nation’s Electric Power Grid
(scitechdaily.com)
INL’s Constrained Cyber Communication Device (C3D) filters and blocks cyberattacks targeting power grid relays, offering real-time protection to critical infrastructure. Researchers from Idaho National Laboratory and New Mexico-based Visgence Inc. have designed and demonstrated a technology that can...
New Cyber Protections Against Stealthy “Logic Bombs” Targeting 3D Printed Drones, Prostheses and Medical Devices
(scitechdaily.com)
Cyber attackers could target 3D-printed objects in health care, aerospace, and other fields. Cybersecurity researchers at Rutgers University-New Brunswick and the Georgia Institute of Technology have proposed new ways to protect 3D printed objects such as drones, prostheses, and medical devices from...
A team of cybersecurity experts has identified significant vulnerabilities in EV charging stations, advocating for enhanced security measures to protect these systems and the connected power grid from cyber threats. As the number of electric cars on the road grows, so does the need for electric vehi...
A Security Technique To Fool Would-Be Cyber Attackers – Method Safeguards a Computer Program’s Secret Information
(scitechdaily.com)
Researchers demonstrate a method that safeguards a computer program’s secret information while enabling faster computation. Multiple programs running on the same computer may not be able to directly access each other’s hidden information, but because they share the same memory hardware, their secret...
Computers, laptops, and other smart gadgets in our homes could be protected by artificial intelligence that can quickly identify and eliminate malware. Cardiff University researchers have developed a new approach for automatically detecting and killing cyberattacks on our laptops, computers, and sma...
Individuals with type 1 diabetes are eight times more likely than others to have an enterovirus infection; the findings support ongoing research on vaccines to help prevent the development of type 1 diabetes. A new study recently presented at the annual conference of the European Association for the...
Predicting Social Group Sizes Through Physics Models The scientists at Complexity Science Hub (CSH) were able to predict the group sizes of people in a computer game by utilizing the average number of friends each person has. They modeled the formation of social groups using an example from physics,...
MIT’s new system analyzes the likelihood that an attacker could thwart a certain security scheme to steal secret information. Researchers have created a system to examine how a hacker can circumvent a particular type of cybersecurity method, in an effort to determine how much secret informatio...