-
"Inside the Mind of a Cybercriminal: Do Digital Law Breakers Have a Personality Type?"Malicious hackers have long been stereotyped as antisocial, loners, and computer addicts by the general public. However, a scientific examination has revealed a more nuanced and complex picture of cybercriminals, with many threat actors showing skills…
-
"ASU Researchers Collaborate Internationally to Secure Power Grid"Yang Weng, an assistant professor of electrical engineering at Arizona State University's Ira A. Fulton Schools of Engineering, is leading a cybersecurity collaboration that bridges American and Israeli organizations to improve both countries'…
-
"Will Protect Personal Data Behind New Algorithms"Ume University's Xuan-Son Vu, a postdoctoral fellow in computing science, is involved in a new research collaboration that will help researchers comply with the EU's General Data Protection Regulation (GDPR). According to Xuan-Son Vu, new methods will be…
-
"Most Apps Used in US Classrooms Share Students' Personal Data With Advertisers, Researchers Find"According to a new study conducted by the nonprofit Internet Safety Labs, 96 percent of apps used in K-12 schools in the US share children's personal information with third parties, including advertisers, often without the knowledge or consent of users…
-
"California Hit By Cyberattack, LockBit Claims Responsibility"California's Cybersecurity Integration Center (Cal-CSIC) recently confirmed that California's finance department had recently been hit by a cyberattack. Upon identification of the threat, digital security and online threat-hunting experts were…
-
"What Dangerous Security Vulnerabilities Can Access Control Systems Have?"Many access control systems that use facial recognition technology are insecure. They can be breached, deceived, and shown a person's photo on the phone screen rather than their actual face. A typical access control system consists of a device in a metal…
-
"'Crisis Situation' Declared as Two Swedish Municipalities Hit by Cyberattack"Following a cyberattack, the Swedish municipalities of Borgholm and Mörbylnga have declared a "crisis situation." An intrusion into the joint Information Technology (IT) system used by the two municipalities, which comprise the island of Öland with a…
-
"Fortinet Urges Customers to Fix Actively Exploited FortiOS SSL-VPN Bug"Fortinet has patched an actively exploited FortiOS SSL-VPN flaw, which could allow a remote, unauthenticated attacker to execute arbitrary code on devices. Fortinet strongly advises customers to update their installations in order to address the FortiOS…
-
"December Headline: Python, C and C++ Competing For Language of The Year Award"According to the TIOBE Index, which promises to check more than one billion lines of code every day in an effort to keep on top of usage, noted that Python remains the most popular coding language, affording a 16.66% rating, just a touch ahead of C in…
-
"24% of Technology Applications Contain High-Risk Security Flaws"During a new study, security researchers at Veracode found that with more applications to contend with than other industries, tech firms would benefit from implementing improved secure coding training and practices for their development teams. The…
-
Book Announcement: International Relations in the Cyber Age: The Co-Evolution DilemmaA foundational analysis of the co-evolution of the internet and international relations, examining resultant challenges for individuals, organizations, firms, and states.
-
"As Wiretap Claims Rattle Government, Greece Bans Spyware"Lawmakers in Greece recently approved legislation banning commercial spyware and reforming rules for legally-sanctioned wiretaps following allegations that senior government officials and journalists had been targeted by shadowy surveillance software.…
News