News
-
"Malvertisers Exploited Browser Zero-Day to Redirect Users to Scams"The ScamClub malvertising group exploited a zero-day vulnerability in the WebKit web browser engine to deliver malicious payloads that redirect users to scams offering gift cards. WebKit is used in Chrome on iOS and Safari. Over the past three months,…
-
Follow @SoS_VO_org on Twitter!Follow @SoS_VO_org on Twitter! The SoS-VO team is excited to announce that we recently updated the homepage of the website to link to the official Science of Security & Privacy twitter account where we will be making daily announcements about…
-
"Cybercrooks Rake in $304M in Romance Scams"Researchers at the Federal Trade Commission (FTC) stated that romance scams remain the most successful fraud strategy for cybercrooks and represent a growing sector. According to new data, the researchers found that romance schemes accounted for a…
-
"North Korean Hackers Tried to Steal Pfizer Vaccine Know-How, Lawmaker Says"South Korea’s intelligence agency has discovered that North Korea attempted to steal information on coronavirus vaccines and treatments by hacking Pfizer Inc. The agency did not elaborate on the timing or success of the attempt. Tuesday’s…
-
"How Apple and Google Let Your Phone Warn You if You've Been Exposed to the Coronavirus While Protecting Your Privacy"Virginia has joined the ranks of states that have enabled app-less COVID-19 exposure notification services for iPhone users. The implementation of such services allows iPhone users in those states to get exposure alerts without having to install exposure…
-
"France Ties Russia's Sandworm to a Multiyear Hacking Spree"The French information security agency ANSSI recently published an advisory warning about Sandworm, a group of hackers within Russia's GRU military intelligence agency. This group has been linked to blackouts in Ukraine as well as NotPetya, which is…
-
"270 Addresses Are Responsible For 55% of All Cryptocurrency Money Laundering"Researchers at a blockchain investigations firm called Chainalysis discovered that criminals who keep their funds in cryptocurrency tend to launder funds through a small cluster of online services. The online services include high-risk (low-…
-
"CISA, FBI Share Recommendations After Water Treatment Hack"The U.S. Homeland Security Department's Cybersecurity & Infrastructure Security Agency (CISA) has issued an alert about the recent compromise of a U.S. drinking water treatment facility, with observations of the incident from CISA, along with the…
-
"Illinois Is State Hit Hardest by Cybercrime"Researchers at Clario produced a new study looking at the number of cybersecurity-related crime victims and used a combination of government, ONS, and census data mixed with open crime data from local constabularies and police forces. The researchers…
-
"Tests Reveal Cybersecurity Vulnerabilities of Common Seismological Equipment"A new study by Michael Samios of the National Observatory of Athens and his colleagues highlights the cybersecurity vulnerabilities of internet-connected seismic equipment, used to detect and record earthquakes. Common security issues associated with…
-
"Nearly Two-Thirds of CVEs Are Low Complexity"Researchers at Redscan have analyzed 18,000+ Common Vulnerabilities and Exposures (CVEs) recorded in NIST's National Vulnerability Database (NVD). The researchers found that there were more CVEs reported in 2020 than any year previously. Over…
-
"Ransomware in the Remote Era: Attackers Impersonate Parents to Target Teachers"Cybercriminals have impersonated parents to trick teachers into falling victim to ransomware attacks. In October of last year, Proofpoint researchers discovered a malicious email campaign that used subject lines in relation to class assignments. The…