News
  • Pub Crawl #44
    ​Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
  • "Good Heavens! 10M Impacted in Pray.com Data Exposure"
    Researchers at vpnMenotor found several open, publicly accessible cloud databases (Amazon Web Service S3 Buckets) belonging to Pray.com.  Pray.com is an application that has been downloaded by more than 1 million people on Google Play and ranks as…
  • "Cyber Criminals Leveraging AI to Carry Out Malicious Attacks, Warns Europol"
    A new report from Europol, the United Nations Interregional Crime and Justice Research Institute (UNICRI), and Trend Micro, brings further attention to cybercriminals' use of Artificial Intelligence (AI) in their attacks. AI-as-a-Service (AIaaS) will…
  • "Facebook Messenger Bug Allows Spying on Android Users"
    A security researcher at Google Project Zero discovered a vulnerability in the Android version of Facebook Messenger that could allow attackers to spy on users and potentially identify their surroundings without them knowing. The vulnerability existed in…
  • Spotlight on Lablet Research #12 - Operationalizing Contextual Integrity
    Spotlight on Lablet Research #12 - Project: Operationalizing Contextual Integrity  
  • "Disaster Apps Share Personal Data in Violation of Their Privacy Policies"
    Madelyn Sanfilippo, a professor in the School of Information Sciences at the University of Illinois at Urbana-Champaign, and a team of experts examined 15 popular disaster apps. These apps fell into five categories: government agency apps, general…
  • "Cisco Webex Bugs Allow Attackers to Join Meetings as Ghost Users"
    Security researchers from IBM discovered three vulnerabilities in the Cisco Webex video conferencing app. When combined, these vulnerabilities can allow an attacker to join a Webex meeting with full access to audio, video, chats, and screen sharing while…
  • "IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk"
    The IoT Cybersecurity Improvement act recently got the stamp of approval by the U.S. Senate and requires that federal procurement and use of IoT devices must conform to basic security requirements.  The act mandates that NIST must issue standards-…
  • "The Role of Drones in 5G Network Security"
    5G is the fifth generation of wireless technology expected to offer faster speeds, lower latency, increased bandwidth, and other benefits. However, the advancements provided by 5G will be accompanied by new security challenges. Giovanni Geraci, a…
  • "Could Your Vacuum be Listening to You?"
    A team of researchers at the University of Maryland (UMD) captured speech, music, and other sounds by gathering information from a popular vacuum robot's laser-based navigation system and applying techniques in signal processing and deep learning. This…
  • "50% of Advanced Phishing Attacks Evade Leading Secure Email Gateways"
    New research from IRONSCALES reveals that nearly 50% of all advanced phishing attempts such as spear-phishing and social engineering attacks evade Secure Email Gateways (SEGs). Hackers are turning to more complex methods that exploit human nature.…
  • "US Holiday Shoppers Fear Cyber-Scams"
    McAfee commissioned 3Gem to survey 1,000 adults over the age of 18 in the US between October 8 and October 13, 2020. The results of McAfee's "2020 Holiday Season: State of Today's Digital e-Shopper" survey indicate that 36% of American consumers plan on…