Hacker Used $300 of TV Equipment to Eavesdrop on Sensitive Satellite Communications

An Oxford University-based security researcher says he used $300 of home television equipment to capture terabytes of real-world satellite traffic.

An unhackable, quantum resistant email technology is on its way

Tutanota is working together with the L3S Research Institute of Leibniz University Hannover on the PQmail project to implement quantum computer resistant cryptography in a free email application.

Chinese experts use quantum satellite to ensure time information security

High-precision time synchronization plays an important role in fundamental science and real-life applications, including navigation and positioning.

How an app store helped two researchers hack an industrial target

When malware spread through the networks of Rheinmetall Automotive last year, it disrupted the German manufacturing firm’s plants on two continents, temporarily costing up to $4 million each week.

Intel-Microsoft joint project turns malware into images

Researchers from Intel and Microsoft have joined forces to study the use of deep learning for malware threat detection in a project that first converts malware into images.

Microsoft and Intel project converts malware into images before analyzing it

The STAtic Malware-as-Image Network Analysis (STAMINA) project uses a new technique to convert malware samples into grayscale images and scan them for specific textural and structural patterns.

FIRST releases updated coordination principles for Multi-Party Vulnerability Coordination and Disclosure

Purpose of the guidelines is to improve coordination and communication across various players during a vulnerability disclosure and provide best practices for reporting issues across multiple vendors.

Apple’s Copyright Lawsuit Has Created a ‘Chilling Effect’ on Security Research

Last year, Apple accused a cybersecurity startup based in Florida of infringing its copyright by developing and selling software that allows customers to create virtual iPhone replicas.

Free image transforms Raspberry Pi devices into secure remote work appliances

Remote.it has released a free image for Raspberry Pi devices that transforms the single-board computer into a full-featured remote work appliance.

Researchers Break FPGA Encryption Using FPGA Encryption

Researchers at Ruhr University Bochum and Max Planck Institute for Cybersecurity and Privacy in Germany have figured out a way to use the FPGA’s own encryption engine against itself.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags