News
  • "IT Student Built Online Games to Help Young People Become Cyber Smart"
    In an effort to help educate high school kids about the cyber world, a student from RMIT Vietnam's School of Science, Engineering, and Technology (SSET) created cybersecurity games. Vietnam is one of Southeast Asia's most popular phishing targets. In the…
  • "North Korean Hackers Created 70 Fake Bank, Venture Capital Firm Domains"
    Security researchers at Kasperksy discovered that North Korea's BlueNoroff hackers have updated their arsenal and delivery techniques in a new wave of attacks targeting banks and venture capital firms.  Part of Lazarus, a hacking group linked to the…
  • "US House of Representatives Bans TikTok on Its Devices"
    TikTok has recently become banned on any device owned and managed by the US House of Representatives.  The House's Chief Administrative Officer (CAO) reportedly told all lawmakers and their staff in an email that they must delete the app from their…
  • "EarSpy Attack Eavesdrops on Android Phones via Motion Sensors"
    Researchers have developed an eavesdropping attack for Android devices that can, to varying degrees, determine the caller's gender and identity, as well as discern private speech. The EarSpy side-channel attack explores new eavesdropping opportunities by…
  • "Internet AppSec Remains Abysmal & Requires Sustained Action in 2023"
    Experts call on improving the security of the Internet and the cloud applications it serves. Beginning in 2022, corporations frantically hunted for and mitigated a severe vulnerability in the Log4j library, a widely used component of numerous systems.…
  • "Reported Phishing Attacks Have Quintupled"
    The third quarter of 2022 was the worst quarter for phishing ever observed by APWG, with 1,270,883 total attacks. The overall number of phishing sites in August 2022 was 430,141, the highest monthly total ever reported to APWG. Reported phishing attacks…
  • "BlueNoroff APT Hackers Using New Ways to Bypass Windows MotW Protection"
    BlueNoroff is a subcluster of the infamous Lazarus Group, which has been discovered incorporating Windows Mark of the Web (MotW) bypass techniques into its playbook. The novel infection chain includes using optical disk image (.ISO extension) and virtual…
  • "Internet of Things Financial Sustainability Depends on Quality and Security"
    Technology phrases such as "data mining," "cryptocurrency," and "influencer" have become increasingly common. Internet of Things (IoT) devices should be included in the list. The phrase refers to physical objects that link to and exchange data with other…
  • "The Rising Risk of Cyber Crime in the Supply Chain"
    Cybercriminals are increasingly focusing on the logistics industry. Companies, as well as their suppliers and third-party service providers, can take measures to reduce their vulnerability. The logistics industry has been an increasingly alluring target…
  • "Military Device Containing Thousands of Peoples' Biometric Data Reportedly Sold on eBay"
    Near Kandahar, Afghanistan, the US military used one of its Secure Electronic Enrollment Kit (SEEK II) devices for the final time more than a decade ago. The technology, a bulky black rectangle used to scan fingerprints and irises, was deactivated and…
  • "Power in Numbers: How a Whole-of-State Approach Can Improve Cybersecurity"
    There has been a noticeable increase in cyberattacks against government organizations. There were 17 million leaked government documents in the first quarter of 2020, a 278 percent increase over the first quarter of 2019. Between July 2021 and June 2022…
  • "Personal Info Possibly Leaked in Hope College Data Breach"
    Hope College, located in Holland, Michigan, recently announced that the personal information of students and other people associated with the college might have been leaked in a data breach.  The college noted that around September 27th, it…