News
  • "Why 72% of People Still Recycle Passwords"
    A report released by Security.org, titled Online Password Strategies, gives insight into why most people continue to reuse old passwords. The poor practice of reusing passwords to log into multiple sites increases the chances of credential stuffing,…
  • "At Least 62 Colleges Were Exploited by a Software Vulnerability"
    The U.S. Department of Education recently issued an alert about the compromise of 62 colleges and universities through the exploitation of a severe software vulnerability. The vulnerability is contained by a program, called Banner, which is used by…
  • "Average Data Breach Cost has Risen to $3.92 million"
    The cost of a data breach has risen 12% over the past 5 years.  A data breach now costs a company $3.92 million on average, according to IBM. These rising expenses are representative of the multiyear financial impact of breaches…
  • "Your Android’s Accelerometer Could Be Used to Eavesdrop on Your Calls"
    A team of researchers have brought attention to a possible side-channel attack on Android phones, called Spearphone. This attack could be executed to eavesdrop on users' phone calls and interactions with their voice assistants via accelerometers in…
  • "What Is Post-Quantum Cryptography?"
    Researchers and security firms are working to develop new cryptographic algorithms that can resist future quantum attacks launched by hackers as quantum computers are expected to render currently used encryption algorithms obsolete. The breaking of…
  • "U.K. Government Urges Organizations to Defend Against DNS Hijacking"
    The U.K. National Cyber Security Center (NCSC) issued an alert to organizations, strongly recommending that they increase their efforts to mitigate the threat of DNS hijacking. The agency's discovery of multiple attempts at exploiting the Domain Name…
  • "Phishing Scheme Targets Amex Cardholders"
    Researchers have recently uncovered a new type of phishing campaign that is targeting American Express card users. When these incidents occur, attackers are sending a hyperlink as part of a phony account update to access the victim's credentials and…
  • "How Penetration Testing Helps Agencies Spot Overlooked Cyber Threats"
    Penetration testing, also known as ethical hacking, is the practice of probing a computer system, network, or application for security vulnerabilities that can be exploited by bad actors to launch attacks. In addition to helping government agencies…
  • "Researchers Build Transistor-Like Gate for Quantum Information Processing -- with Qudits"
    A quantum version of a transistor has been built by researchers at Purdue University. The transistor-like quantum gate was built with qudits to allow for the encoding and processing of more quantum information as qudits exist in multiple states. The two-…
  • "Tackling Emerging Cyber-Social Threats"
    The U.S. Department of Defense has awarded a $2.4 million grant to Dr. Nitin Agarwal, the director of Collaboratorium for Social Media and Online Behavioral Studies (COSMOS) at the University of Arkansas at Little Rock. The grant was given in support of…
  • "FaceApp Privacy Panic Sets Internet Alight"
    FaceApp is an app that denies you any rights in its terms and conditions.  The terms in conditions of FaceApp are as follows: When FaceApp is used, "you grant FaceApp a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully-paid,…
  • "Security Experts Warn Against Use of FaceApp"
    The public has been advised by security experts and privacy advocates to avoid using the viral mobile face-editing app, called FaceApp. In order for FaceApp to work, users must give it permission to access all of their photos. In addition, the app gains…