News
  • "Mobile Websites Can Tap Into Your Phone's Sensors Without Asking"

    Researchers have discovered that many mobile websites have been accessing smartphone sensors such as those used for motion, light, and proximity, without the permission of users. These websites include Wayfair, Priceline, Kayak, and more. This article…

  • "A New Cybersecurity Research Group Focuses on Human Behavior"

    Human behavior is the focus of the Evidence-based Cybersecurity Research Group led by David Maimon at Georgia State University. The research conducted by this group delves deeper into the interactions of major actors in the cybercrime ecosystem, which…

  • "Security Researcher Fined for Hacking Hotel Wi-Fi and Putting Passwords on the Internet"

    A security researcher named Zheng Dutao was recently fined as a result of an unauthorized hack into a hotel’s Wi-Fi system and publishing of a blog post pertaining to the hack. The incident highlights the importance of properly disclosing security issues…

  • "Think Like An Attacker: How a Red Team Operates"

    An organization can bolster their defenses against cyber threats through the establishment of a red team. A red team finds different ways in which threat actors could compromise an organization by acting as the adversaries. This article continues to…

  • "Why Humans Are Necessary to the Threat Hunting Process"

    Human Intelligence (HUMINT) is a source of intelligence that is often disregarded in the performance of cyber threat intelligence gathering. The gathering of human intelligence can help in defending organizations from cyberattacks in the long term.…

  • "Hackers Target Real Estate Deals, with Devastating Impact"

    According to a report released by the FBI's Internet Crime Complaint Center, there has been a significant increase in the percentage of those that have fallen victim to email fraud involving real estate transactions. Losses have also been reported to be…

  • "Meet EyeTell, the Next Threat to Touch-Screen Passwords"

    Researchers at Arizona State University have demonstrated a tactic that could be used by hackers to figure out a user’s passcode, PIN, or lock pattern. The technique has been demonstrated through the use of a digital tool called EyeTell, which could…

  • "Computer Scientist Working to Test Security of IoT Systems, Blockchains"

    Researchers have been awarded a grant by NIST to develop a new way in which software systems can be securely tested. The new method to security testing being developed by researchers aims to prevent vulnerabilities deriving from errors made in the…

  • Cyber Scene #25 - CRAZY (CYBER) RICH...

    Cyber Scene #25 CRAZY (CYBER) RICH...

  • SoS Musings #18 - Get Smart About Smart City Cybersecurity

    SoS Musings #18 Get Smart About Smart City Cybersecurity

  • "Mirai Creators Helping FBI Crack Cybercrime Cases"

    Creators of the infamous Mirai botnet are now completing their community service by assisting the FBI in the investigation of cybercrimes and performance of other cybersecurity-related tasks. The skills that these offenders used in their performance of…

  • New Whitehouse National Cyber Strategy

    Whitehouse has released a National Cyber Strategy. The strategy is to "strength our defense against cyber threats." Highlights include: Defend the homeland by protecting networks, systems, functions, and data; Promote American prosperity by…