News
-
CMU launches new privacy engineering optionsCMU launches new privacy engineering options Two new options make it easier for working professionals to receive privacy engineering training Daniel Tkacik NOV 23, 2020 As new privacy regulations like the General Data Protection Regulation and the…
-
Pub Crawl #44Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.
-
"Good Heavens! 10M Impacted in Pray.com Data Exposure"Researchers at vpnMenotor found several open, publicly accessible cloud databases (Amazon Web Service S3 Buckets) belonging to Pray.com. Pray.com is an application that has been downloaded by more than 1 million people on Google Play and ranks as…
-
"Cyber Criminals Leveraging AI to Carry Out Malicious Attacks, Warns Europol"A new report from Europol, the United Nations Interregional Crime and Justice Research Institute (UNICRI), and Trend Micro, brings further attention to cybercriminals' use of Artificial Intelligence (AI) in their attacks. AI-as-a-Service (AIaaS) will…
-
"Facebook Messenger Bug Allows Spying on Android Users"A security researcher at Google Project Zero discovered a vulnerability in the Android version of Facebook Messenger that could allow attackers to spy on users and potentially identify their surroundings without them knowing. The vulnerability existed in…
-
Spotlight on Lablet Research #12 - Operationalizing Contextual IntegritySpotlight on Lablet Research #12 - Project: Operationalizing Contextual Integrity
-
"Disaster Apps Share Personal Data in Violation of Their Privacy Policies"Madelyn Sanfilippo, a professor in the School of Information Sciences at the University of Illinois at Urbana-Champaign, and a team of experts examined 15 popular disaster apps. These apps fell into five categories: government agency apps, general…
-
"Cisco Webex Bugs Allow Attackers to Join Meetings as Ghost Users"Security researchers from IBM discovered three vulnerabilities in the Cisco Webex video conferencing app. When combined, these vulnerabilities can allow an attacker to join a Webex meeting with full access to audio, video, chats, and screen sharing while…
-
"IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk"The IoT Cybersecurity Improvement act recently got the stamp of approval by the U.S. Senate and requires that federal procurement and use of IoT devices must conform to basic security requirements. The act mandates that NIST must issue standards-…
-
"The Role of Drones in 5G Network Security"5G is the fifth generation of wireless technology expected to offer faster speeds, lower latency, increased bandwidth, and other benefits. However, the advancements provided by 5G will be accompanied by new security challenges. Giovanni Geraci, a…