Networks

now browsing by tag

 
 

International Conference on Dependable Systems and Networks

General Cybersecurity Conference

 June 25 – 28, 2018 | Luxembourg City, Luxembourg

Cybersecurity Conference Description 

The IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) has a distinctive approach to accidental and malicious faults under a common body of knowledge. Today, it is the most prestigious international forum for presenting advanced and innovative research results, problem solutions, practices, and insights on new challenges in the field of dependable and secure computing.

DSN is the flagship conference for research furthering robustness and resilience of today’s wide spectrum of computing systems. Indeed, dependability and security concerns can no longer be tackled in isolation, from general IT to the internet-of-things, cyber-physical systems and application areas.

advertisement:

The post International Conference on Dependable Systems and Networks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

International Workshop on Security and Privacy Assurance Technologies for Emerging Networks (SPATEN)

General Cybersecurity Conference

 June 22, 2018 | Tianjin, China

Cybersecurity Conference Description

The 2018 International Workshop on Security and Privacy Assurance Technologies for Emerging Networks (SPATEN 2018) focuses on the problems of design and analysis of security, privacy, and data protection algorithms in various emerging network systems and concepts such as Internet of Things, Edge Computing, Fog Computing, Software Defined Networks, Blockchian, Cryptocurrency, etc. SPATEN 2018 will be held in conjunction with The 13th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2018), June 20-22, 2018, Tianjin, China.

The workshop seeks submissions from academia, industry, and government presenting novel research, as well as experimental studies, on all theoretical and practical aspects of security, privacy, and data protection algorithms in emerging network systems.

advertisement:

The post International Workshop on Security and Privacy Assurance Technologies for Emerging Networks (SPATEN) appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Norway and #US #Busted #Hacking Russian #Networks to #Gain #Data on #Leadership

This is the first time Norwegian hacking efforts to obtain intelligence information on Russia have been documented. According to formerly classified documents, Norway and the US have been pooling their spying efforts since 2011.

Norwegian and US intelligence services have collaborated on hacking Russian networks in order to retrieve information on Russia’s political leadership and energy policy, as proceeds from the formerly classified documents by the National Security Agency (NSA) published by The Intercept.

Previously, only a small part of the three-page document was available, but now the document has been made available in its entirety.

It was in September 2011 that Norway’s Intelligence Service (NIS) first informed the NSA that they were running espionage programs in computer networks, whereupon an agreement on data-sharing was reached. The NSA would then expand and strengthen cooperation with Norway, focusing on targets in the Russian political leadership and Russia’s management of natural and energy resources.

An annual planning meeting between the NSA and the NIS was held on March 7, 2013. Some of the topics discussed were Norway’s access to data cables, data processing and external data storage, as well as obtaining information from commercial satellites.

Read More….

advertisement:

The post Norway and #US #Busted #Hacking Russian #Networks to #Gain #Data on #Leadership appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Mobile #networks #investigate flaw that leaves #4G #customers open to #hacking

Source: National Cyber Security News

Security researchers have discovered a set of severe vulnerabilities in 4G LTE protocol that could be exploited to spy on user phone calls and text messages, send fake emergency alerts, spoof location of the device and even knock devices entirely offline.
A new research paper [PDF] recently published by researchers at Purdue University and the University of Iowa details 10 new cyber attacks against the 4G LTE wireless data communications technology for mobile devices and data terminals.
The attacks exploit design weaknesses in three key protocol procedures of the 4G LTE network known as attach, detach, and paging.

Unlike many previous research, these aren’t just theoretical attacks. The researchers employed a systematic model-based adversarial testing approach, which they called LTEInspector, and were able to test 8 of the 10 attacks in a real testbed using SIM cards from four large US carriers.

Authentication Synchronization Failure Attack
Traceability Attack
Numb Attack
Authentication Relay Attack
Detach/Downgrade Attack
Paging Channel Hijacking Attack
Stealthy Kicking-off Attack
Panic Attack
Energy Depletion Attack
Linkability Attack

Among the above-listed attacks, researchers consider an authentication relay attack is particularly worrying, as it lets an attacker connect to a 4G LTE network by impersonating a victim’s phone number without any legitimate credentials.

This attack could not only allow a hacker to compromise the cellular network to read incoming and outgoing messages of the victims but also frame someone else for the crime.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Russian group #hacked German #government’s secure #computer #networks

Source: National Cyber Security News

A Russian-backed hacker group known for many high-level cyber attacks was able to infiltrate the German government’s secure computer networks, the dpa news agency reported Wednesday.

Dpa cited unidentified security sources saying the group APT28 hacked into Germany’s foreign and defence ministries and managed to steal data.

The attack was noticed in December and may have lasted a year, dpa reported.

The Interior Ministry said in a statement that “within the federal administration the attack was isolated and brought under control.” The ministry said it was investigating.

A spokesman wouldn’t give further details, citing the ongoing analysis and security measures being taken.

“This case is being worked on with the highest priority and considerable resources,” the ministry statement said.

APT28, which has been linked to Russian military intelligence, has previously been identified as the likely source of an attack on the German Parliament in 2015, as well as on NATO and governments in eastern Europe.

Also known by other names including “Fancy Bear,” APT28 has also been blamed for hacks of the U.S. election campaign, anti-doping agencies and other targets.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Bitcoin users are opening their wallets to hackers through mobile networks

Source: National Cyber Security – Produced By Gregory Evans

Cryptocurrencies like Bitcoin make a big deal of their security; theoretically, they are almost impossible to hack. Every transaction is stored in a ‘digital ledger’, shared across multiple machines; an attacker would need to compromise every computer in the chain to successfully hack the system. However, the digital wallets that…

The post Bitcoin users are opening their wallets to hackers through mobile networks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Stay safe online this summer, watch out for fake WiFi networks

Source: National Cyber Security – Produced By Gregory Evans

Better Business Bureau warns if you are traveling this summer and taking advantage of free WiFi, double check before connecting your device. Scammers use fake WiFi hotspots to steal personal information or gain access to your device. “Say you’re at a coffee shop, airport, hotel lobby, or other public place,…

The post Stay safe online this summer, watch out for fake WiFi networks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

‘Hack-proof’ quantum internet networks closer to reality, studies say

Source: National Cyber Security – Produced By Gregory Evans

A powerful quantum internet that’s impervious to hacking is a little closer to reality thanks to breakthroughs outlined in two new studies this week. But an expert warns the super-secure quantum-based network may still be at least a decade away. Quantum physics and the pursuit of an “unhackable” internet rely…

The post ‘Hack-proof’ quantum internet networks closer to reality, studies say appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Intel Joins Team8 Cybersecurity Syndicate, Collaborates With Illusive Networks

Source: National Cyber Security – Produced By Gregory Evans

Intel Joins Team8 Cybersecurity Syndicate, Collaborates With Illusive Networks

Intel announced today it has joined the cybersecurity syndicate established by Team8, a unique Tel-Aviv-based startup-creation platform focused on developing new cybersecurity solutions. In addition, Intel announced it will work with one of Team8’s companies, Illusive Networks, to develop a solution to combat Advanced Persistent Threats (APTs) by combining hardware…

The post Intel Joins Team8 Cybersecurity Syndicate, Collaborates With Illusive Networks appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Israeli Spies Hacked ISIS Computer Networks, Exposed Their “Laptop Bomb” Plans

Source: National Cyber Security – Produced By Gregory Evans

Israeli Spies Hacked ISIS Computer Networks, Exposed Their “Laptop Bomb” Plans

Israeli cyber researchers recently decoded ISIS’s attack plan. The terror group had built a laptop computer bomb that could have exploded the commercial aircraft to the US. But Israeli government cyber security broke into ISIS’s computer networks months ago and revealed the terror group’s plan. According to The New York…

The post Israeli Spies Hacked ISIS Computer Networks, Exposed Their “Laptop Bomb” Plans appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures