News
  • "Cybercrime: Internet Erodes Teenage Impulse Controls"
    A new study conducted by Flinders Criminology found that teenagers' struggle to control their impulses on the internet could make them more susceptible to engaging in cybercriminal activities. Researchers behind the study delved into how the nature of…
  • "What do Online File Sharers Want With 70,000 Tinder Images?"
     A researcher has discovered a collection of over 70,000 photographs harvested from the dating app Tinder on several undisclosed websites.  The data found also contained around 16,000 unique Tinder user IDs. The images are available for free.…
  • "Worldwide IT Spending to Total $3.9 Trillion in 2020"
    In a new study conducted by Gartner, researchers found that worldwide IT spending will total $3.9 trillion in 2020, an increase of 3.4% from 2019.  Global IT spending is going to be around $4 trillion in 2021. Researchers also discovered that the…
  • "FBI Takes Down Site Selling Subscriptions to Stolen Data"
    The FBI, with support from the UK's National Crime Agency, the Dutch National Police Corp, the German Bundeskriminalamtt, and the Police Service of Northern Ireland, took down a site called WeLeakInfo, that was used by cybercriminals to sell stolen…
  • "Homomorphic Encryption Improves Cloud Security"
    A team of researchers outlined a proposed homomorphic encryption system in the International Journal of Cloud Computing. Homomorphic encryption takes on a new approach to encryption by performing computations on encrypted data without having to decrypt…
  • "SIM Swap Attacks Making Two-Factor Authentication via Smartphones Obsolete"
    Security researchers at PhishLabs further emphasized that SIM swap attacks are making SMS two-factor authentication (2FA) obsolete. A SIM swapping attack refers to the performance of social engineering to trick mobile carriers into transferring control…
  • "Software Detects Backdoor Attacks on Facial Recognition"
    The growing use of facial and object recognition by the US Army to train artificial intelligent (AI) systems in the identification of threats call for increased efforts toward bolstering the security of such technology against attacks. Researchers at…
  • "Detecting and Mitigating Network Attacks With a Multi-Prong Approach"
    An international team of researchers developed an approach to detecting malicious attacks such as jamming attacks, replay attacks, and more, on the communication network and the physical system in a networked control system. These types of attacks often…
  • "Apps are Sharing More of Your Data With Ad Industry Than you may Think"
    In a new study, researchers analyzed data traffic from ten popular Android apps (which are also all available on iPhones). The ten apps researched include Grindr, OkCupid, Tinder, Clue, MyDays, Perfect365, My Talking Tom 2, Qibla Finder, Happn, and Wave…
  • "'Cable Haunt' Vulnerability Exposes 200 Million Modem Cables to MITM Attacks"
    Researchers from Lyrebirds, along with an independent researcher, discovered a security vulnerability, named Cable Haunt, in Broadcom's cable modem. The flaw left an estimate of 200 million home broadband gateways susceptible to remote hijacking attacks…
  • "Lawmakers Ask FCC to Protect Consumers from Phone Hijackers"
    Lawmakers are asking the Federal Communications Commission (FCC) to use the regulatory agency's authority over wireless carriers to enforce better protection for consumers from SIM swap scams. Fraudsters perform these scams by persuading wireless…
  • "How to Implement a 'Threat Model' to Beef up Your Organization’s Security"
    Security professionals are encouraged to practice threat modeling to bolster the security of their organizations. Threat modeling refers to the classification of assets associated with a system, identifying the possible attacks against these assets, the…