Steganography is the practice of hiding messages or information in plain sight, especially inside other data or images. And a new toolset, which debuted earlier this month at the Black Hat Europe conference in London, suggests steganography is going to get much more difficult to spot
CS Digest Section: FEEDBACK FROM PREVIOUS DIGEST
SpiNNaker's spiking neural network mimics the human brain, and could fuel breakthroughs in robotics and health.
The military supply chain is vast, multifaceted, and riddled with potential cyber vulnerabilities.
You and 800 million other people now can use hardware authentication keys -- and no password at all -- to log on to Microsoft accounts used for Outlook, Office 365, OneDrive, Skype and Xbox Live.
The team of grid operators had spent days restoring power when a digital strike took out one of two operational utility stations. The other utility was also under attack.
For the last two years, U.S. Cyber Command ran pilot programs that focused on supporting operations in Iraq and Syria. Now, the U.S. Army is taking lessons from those experiments and applying them to tactical operations.
The National Institute of Standards and Technology (NIST) is planning to use Artificial Intelligence to assign the CVSS scores to reported vulnerabilities.
U.S. Cyber Command has made it clear that it must undertake traditional and nontraditional partnerships in order to succeed in a highly dynamic environment.
Researchers from Radboud University Nijmegen in the Netherlands yesterday disclosed a pair of vulnerabilities in the hardware full-disk encryption mechanisms of self-encrypting solid state drives (SSDs) from Samsung and Crucial. The flaws are present in both internal and external storage devices from these manufacturers, and even affect Microsoft Windows
Researchers have uncovered an active phishing campaign which targets Android devices in order to turn them into mobile proxies.