News
  • "Academics Hide Humans from Surveillance Cameras with 2D Prints"
    Researchers from the Catholic University in Leuven (KU Leuven) have developed a method that could be used to make humans invisible to AI-powered surveillance camera systems. The method involves the printing and strategic placement of 2D images on to…
  • "Facebook Marketplace Flaw Revealed Seller's Exact Location"
    The JSON JavaScript object notation for advertisements that had been created with the Facebook mobile app were not approximate.  The listing included not only the full postcode, but also the latitude and longitude coordinates of the seller.…
  • "There’s a Massive Cybersecurity Job Gap – We Should Fill It by Employing Hackers"
    The growing frequency and sophistication of cyberattacks calls for the increase in cybersecurity professionals. A study conducted by researchers at Bournemouth University suggests the filling of the cybersecurity workforce gap with hackers. Findings of…
  • "A 'Blockchain Bandit' Is Guessing Private Keys and Scoring Millions"
    Security researchers with the firm, Independent Security Evaluators, have discovered the storing of cryptocurrency with easily guessable private keys and the exploitation of these keys by a blockchain bandit to steal the cryptocurrency, Ethereum.…
  • "Improving Security as Artificial Intelligence Moves to Smartphones"
    Devices such as smartphones, security cameras, and speakers, will soon rely more on artificial intelligence to increase the speed at which speech and images are processed. A compression technique, called quantization, reduces the size of deep learning…
  • Cyber Scene #32 - Globalized Tech: Tightropes Everywhere
    Cyber Scene #32 Globalized Tech: Tightropes Everywhere
  • "LinkedIn Data Found in Unsecured Databases"
    LinkedIn used eight unsecured databases which held approximately 60 million records of LinkedIn user information.  The unsecured data contained: LinkedIn profile information, including IDs, profile URLs, work history, education history,…
  • "6 Takeaways from Ransomware Attacks in Q1"
    Although there has been a decrease in the number of ransomware attacks, the intensity of such attacks have grown in that ransom payments are higher, downtime loss is greater, and the recovery time is longer. According to a new report released by…
  • "Security Culture Questions to Consider"
    In order for enterprises to more effectively mitigate cybersecurity weaknesses, a security culture must be fostered within the workplace through the use of tools, training, and other technology aids. Enterprise security culture is an essential part of…
  • "How an Annual ‘Cyber Shield’ Drill Helps the National Guard Secure Elections"
    Cyber Shield is an Army National Guard exercise aimed at testing and enhancing the cyber incident-response capabilities of the Guard. Participants of this year's exercise include National Guard units from 40 states, those working in the private…
  • "Microsoft email breach gave hackers access to account information for months"
    Microsoft has been affected by a data breach involving attackers leveraging a customer support account to access customers’ email information.  Microsoft-managed email services such as @Outlook.com, @MSN.com and @Hotmail.com were affected by the…
  • "Cybercriminals Attack Cloud Server Honeypot Within 52 Seconds"
    A report recently released by Sophos, titled “Exposed: Cyberattacks on Cloud Honeypots”, highlights the speed at which a cloud server honeypot was attacked by cybercriminals, the average number of attempted attacks on cloud servers per minute, and more.…