by Emma Szczesniak Neural interface systems such as myoelectric-computer interfaces (MCIs) and brain-computer interfaces (BCIs) assist patients with motor impairment due to injury or neurodegenerative conditions. Neural interface research has focused on device accuracy and usability while neglecting to comprehensively assess security risks. These devices store substantial personal data that can be exploited if compromised. Attacks…
By Dr. Nataliya D. Brantly U.S. healthcare has changed significantly since the early 2000s. This change was spurred by a number of studies that documented and exposed systemic failures, inefficiencies, poor coordination, and inadequate patient-centered care.[1]High levels of medical errors in a clinical setting, contributing to the thousands of deaths annually, emphasized the need to…
Ransomware poses a persistent threat in the cyber landscape. Over the past four years, there have been more than 19,000 recorded ransomware attacks and leaks, with the number of victims increasing daily. The massive number of attacks in such a short timespan highlights the importance of understanding the tactics employed by ransomware groups.
Haleigh Horan and Divine Tsasa Nzita Ransomware attacks have become more common over the past several years and there has been a prominent spike in ransomware attacks against the education sector. As schools and school districts increase their use of technology across their enterprise operations they are increasingly viewed as potential targets with critical…
By Ethan Dettman As cyber threats become more and more prevalent today, Chinese threat actor groups employ many malware packages to obtain information, both for personal gain and the benefit of the Chinese state. One of the most prevalent packages is Shadowpad, which has been used since 2017. Shadowpad is privately shared among Chinese-linked…
By Brooke Spens Abstract/Introduction In the modern era, surveillance practices have been used for various purposes from tracking a significant other to monitoring individuals’ data to generate profit. Through extensive research efforts, patterns surrounding the utilization of intrusive surveillance tools and instances of co-opting technology by those with malicious intent have emerged; the disproportionate…
By Christian Calvo Abstract Bluetooth Low Energy (BLE) is a wireless communication protocol designed for use in a variety of commercial devices. Devices that utilize BLE often have inferior security systems compared to alternative wireless devices, enabling malicious parties to more effectively execute adversarial attacks. To iterate the impact of adversarial attacks on BLE…
Deception technology in the cybersecurity and ransomware space has long been regarded as a method of threat actor data collection with strong potential. Some of this technology includes Honeypots, Honeyfiles, and Honeynets – faux systems, files, and networks meant to mimic an organization’s digital resources to further understand new attack vectors and threat actor…
The Food and Drug Administration (FDA) is a United States agency responsible for regulating medical devices among other functions. The regulation process entails a lengthy pre-market process that looks at pre-clinical trials, clinical trials, the warehouse in which the device is manufactured, ethics behind the device, and more. When it comes to the device…
When Project Mayhem won the DARPA Grand Challenge in 2014, the project lead from Carnegie Mellon, Dr. David Brumley, writing on his team’s success, quoted DARPA program director Mike Walker saying the program was just the ““beginning of a revolution” in software security.” What could be better than an AI white hat hacker finding…