study
-
arXiv:2501.07028v1 Announce Type: new Abstract: Due to the current standard of Security Credential Management System (SCMS) for Vehicle-to-Everything (V2X) communications using asymmetric cryptography, specifically Elliptic-Curve Cryptography (ECC), which may be vulnerable to quantum computing attacks. Therefore, the V2X SCMS is threatened by quantum computing attacks. However, although the National Institute of Standards and Technology (NIST)…
-
House lawmakers will once again push for an outside assessment of whether a Cyber Force should be added to the U.S. military, one of the idea’s chief proponents said on Wednesday. “We’re not going to back off that,” Rep. Morgan Luttrell (R-TX) said during a roundtable with reporters in his Capitol Hill office, saying an…
-
Research finds people who have more than four coffees a day have 17% lower chance of head and neck cancers. From a report: If the only thing getting you through a mountain of present-wrapping is a mug of tea or coffee, be of good cheer. Researchers have found people who consume those drinks have a…
-
arXiv:2412.15423v1 Announce Type: new Abstract: In the recent past, so-called pig-butchering scams are on the rise. This term is based on a translation of the Chinese term “Sha Zhu Pan”, where scammers refer to victims as “pig” which are to be “fattened up before slaughter” so that scammer can siphon off as much monetary value…
-
submitted by /u/INIT_6_ [link] [comments]
-
MalBot December 15, 2024, 12:20pm 1 Molly Callahan reports: Boston University’s renowned Framingham Heart Study (FHS) was breached by hackers, who gained access to the data of participants—both living and deceased—of the country’s longest running, multigenerational heart study. BU officials say the hackers gained access to the study’s server, but that information technology specialists from…
-
Cozy Bear is a Russian, state-sponsored group that has conducted operations on behalf of Russia’s Foreign Intelligence Service aka SVR since at least 2008. This group mainly seeks persistent access to strategic targets with intelligence value for Russia but has other aims, including the theft of intellectual property that will benefit Russian businesses. Other names given…
-
Share this article
-
A new NetRise report provides an in-depth analysis of software compositions, vulnerability risks, and non-CVE risks across various asset classes within an organization’s software supply chain. Edition 2 of this report explores the extent and magnitude of components and risks identified in 70 of the most frequently downloaded Docker Hub container images.
-
Share this article
-
An area of land nearly a third larger than India has turned from humid conditions to dryland — arid areas where agriculture is difficult — in the past three decades, research has found. From a report: Drylands now make up 40% of all land on Earth, excluding Antarctica. Three-quarters of the world’s land suffered drier…
-
The plan to consider establishing a separate cyber military service has been curtailed in a compromise version of the annual defense policy bill, likely halting any momentum for the idea.
-
Free and Open Source Software (FOSS) has become a critical part of the modern economy and it’s estimated that up to 96 percent of codebases now include it.
-
MalBot December 2, 2024, 3:15pm 1 Crypto Mining Crypto mining is the process by which individuals or organizations use computer power to solve complex…
-
Share this article
-
Electronic voting (e-voting) systems have become more prevalent in recent years, but security concerns have also increased, especially regarding the privacy and verifiability of votes. As an essential ingredient for constructing secure e-voting systems, designers often employ zero-knowledge proofs (ZKPs), allowing voters to prove their votes are valid without revealing them. Invalid votes can then…
-
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
-
PRESS RELEASE PALO ALTO, Calif., Nov. 19, 2024 /PRNewswire/ — As artificial intelligence (AI) continues to revolutionize industries, the cybersecurity field faces a dual-edged sword of opportunities and threats. StrongDM’s latest report, “The State of AI in Cybersecurity,” highlights the growing concerns and readiness of cybersecurity professionals to tackle AI-driven challenges. Based on a survey of 600…
-
Credential phishing remains a formidable threat to organizations worldwide, with malicious actors often relying on tricking individuals into voluntarily revealing sensitive login information. Recent years have seen a surge in Multi-Factor Authentication (MFA) bypass attacks, where threat actors exploit weaknesses in outdated MFA methods like SMS codes, authenticator apps, and push notifications. These methods, while…