News
  • "Disaster Apps Share Personal Data in Violation of Their Privacy Policies"
    Madelyn Sanfilippo, a professor in the School of Information Sciences at the University of Illinois at Urbana-Champaign, and a team of experts examined 15 popular disaster apps. These apps fell into five categories: government agency apps, general…
  • "Cisco Webex Bugs Allow Attackers to Join Meetings as Ghost Users"
    Security researchers from IBM discovered three vulnerabilities in the Cisco Webex video conferencing app. When combined, these vulnerabilities can allow an attacker to join a Webex meeting with full access to audio, video, chats, and screen sharing while…
  • "IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk"
    The IoT Cybersecurity Improvement act recently got the stamp of approval by the U.S. Senate and requires that federal procurement and use of IoT devices must conform to basic security requirements.  The act mandates that NIST must issue standards-…
  • "The Role of Drones in 5G Network Security"
    5G is the fifth generation of wireless technology expected to offer faster speeds, lower latency, increased bandwidth, and other benefits. However, the advancements provided by 5G will be accompanied by new security challenges. Giovanni Geraci, a…
  • "Could Your Vacuum be Listening to You?"
    A team of researchers at the University of Maryland (UMD) captured speech, music, and other sounds by gathering information from a popular vacuum robot's laser-based navigation system and applying techniques in signal processing and deep learning. This…
  • "50% of Advanced Phishing Attacks Evade Leading Secure Email Gateways"
    New research from IRONSCALES reveals that nearly 50% of all advanced phishing attempts such as spear-phishing and social engineering attacks evade Secure Email Gateways (SEGs). Hackers are turning to more complex methods that exploit human nature.…
  • "US Holiday Shoppers Fear Cyber-Scams"
    McAfee commissioned 3Gem to survey 1,000 adults over the age of 18 in the US between October 8 and October 13, 2020. The results of McAfee's "2020 Holiday Season: State of Today's Digital e-Shopper" survey indicate that 36% of American consumers plan on…
  • "ThreatList: Pharma Mobile Phishing Attacks Turn to Malware"
    Adversaries are using mobile phishing attacks to target pharmaceutical companies more frequently since the beginning of COVID-19 and have shifted their focus from credential theft to malware delivery. New research shows that 77 percent of pharmaceutical…
  • "Help Wanted: The Cybersecurity Workforce of the Future Starts with Students Today"
    The growing vulnerability of critical infrastructure systems to cyberattacks calls for more cybersecurity professionals that can help harden and protect them from unauthorized access. The cybersecurity workforce shortage remains as studies show that…
  • "Researchers Warn of Internet Security Risks Connected to Tesla Backup Gateway"
    Rapid7 researchers have brought attention to the security risks that stem from connecting the Tesla Backup Gateway to the internet. The Tesla Backup Gateway is designed to allow the automaker to manage solar and battery/Powerwall installations. It can…
  • "Why Biometrics Will Not Fix All Your Authentication Woes"
    The number of data breaches will increase in the future, and many organizations want to replace passwords with biometric authentication.  Biometric authentication is becoming more widely used by organizations, and it is expected to create a market…
  • "Hackers Selling Credentials via 'Cloud of Logs'"
    New research from Trend Micro reveals the use of cloud services by cybercriminals to speed up attacks, thus decreasing the time needed for enterprises to identify and respond to an incident. Trend Micro also discovered an underground market called the…