"Understanding Users' Perceptions of Security in Mobile Devices Using the Two-Step Cluster Analysis"

"Understanding Users' Perceptions of Security in Mobile Devices Using the Two-Step Cluster Analysis"

New research explores user perceptions of mobile device security and provides recommendations for users and manufacturers of such devices. A team of researchers at North-West University (NWU) in Mahikeng, South Africa, reveals findings regarding the awareness of mobile security issues of students in the region. A survey of 142 students at NWU showed that some students incorrectly believe mobile phones are inherently secure. Others are unaware that these devices can be less secure than desktop or laptop computers.

Submitted by Gregory Rigby on

"Cracking the Code: Why People Fall for Scams"

"Cracking the Code: Why People Fall for Scams"

In an interview with the University of New South Wale (UNSW) Business School, Dr. Kam-Fung Cheung, Lecturer at the School of Information Systems and Technology Management (ISTM), and Shesha J. Maheshwari, a research student at ISTM, stress the importance of understanding the psychological factors that make people susceptible to scams. According to the experts, financial desperation and a lack of awareness about evolving fraud techniques make many individuals fall for scams today. Dr. Cheung and Ms.

Submitted by Gregory Rigby on

"Spyware Can Infect Your Phone or Computer via the Ads You See Online"

"Spyware Can Infect Your Phone or Computer via the Ads You See Online"

People leave digital traces of what they did, where they went, who they communicated with, what they purchased, what they are considering purchasing, and much more. This data serves as a library of information for personalized ads sent to users by a sophisticated network, a lightning-fast automated marketplace of advertisers, publishers, and ad brokers. The ad networks are designed to protect identities, but people can still be identified and tracked by combining different pieces of data.

Submitted by Gregory Rigby on

"Florida City Duped Out of $1.2 Million in Phishing Scam, Police Say"

"Florida City Duped Out of $1.2 Million in Phishing Scam, Police Say"

Scammers impersonating a construction company have recently duped the Florida city of Fort Lauderdale out of $1.2 million, sparking a police investigation.  The city paid the sum on Sept. 14 after receiving what was believed to be a legitimate bill from Moss Construction, a company that's building a new police station for the coastal city north of Miami.  The police noted that the bill was discovered to be a scam within a day.  The city is currently trying to get its money back.

Submitted by Adam Ekwall on

"Hong Kong Crypto Business Mixin Says Hackers Stole $200 Million in Assets"

"Hong Kong Crypto Business Mixin Says Hackers Stole $200 Million in Assets"

Mixin, a Hong Kong-based cryptocurrency company, has disclosed that hackers stole about $200 million worth of its assets after attacking its cloud service provider. The company has temporarily suspended deposit and withdrawal services due to the incident. Mixin offers a network for transferring digital currency and similar assets. The company contacted Google and SlowMist, a blockchain security company, to investigate.

Submitted by Gregory Rigby on

"Nigerian Pleads Guilty in US to Million-Dollar BEC Scheme Role"

"Nigerian Pleads Guilty in US to Million-Dollar BEC Scheme Role"

A Nigerian national residing in South Africa has recently pleaded guilty in court in the United States to his role in a million-dollar business email compromise (BEC) fraud scheme.  The man, Kosi Goodness Simon-Ebo, 29, was extradited to the US from Canada in April 2023.  According to the Department of Justice (DoJ), Simon-Ebo was involved in a conspiracy to commit BEC fraud and money laundering with total intended losses of close to $7 million.  The actual loss from the scheme, however, was of just over $1 million.  Simon-Ebo admitted in court to gaining unauthorized ac

Submitted by Adam Ekwall on

"From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese"

"From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese"

Tibetan, Uyghur, and Taiwanese individuals and organizations are being targeted by a persistent campaign aimed at stealing sensitive information. According to security researchers at Volexity, the attacker has developed fake Tibetan websites and social media profiles to launch browser-based exploits against targeted users. To help spread their malware, the attacker has formed communities on online platforms such as Telegram, partly by impersonating existing popular communities.

Submitted by Gregory Rigby on

"New Stealthy and Modular Deadglyph Malware Used in Government Attacks"

"New Stealthy and Modular Deadglyph Malware Used in Government Attacks"

A cyber espionage attack against a government agency in the Middle East involved a novel and sophisticated backdoor malware named Deadglyph. The Deadglyph malware is attributed to the Stealth Falcon Advanced Persistent Threat (APT) group, also known as Project Raven or FruityArmor, a United Arab Emirates (UAE) state-sponsored hacking group. For nearly a decade, the cyber group has been targeting activists, journalists, and dissidents. In a new report released at the LABScon cybersecurity conference, ESET researcher Filip Juracko explains how the new modular malware infects Windows systems.

Submitted by Gregory Rigby on

"Current Ransomware Defensive Efforts Are Not Working"

"Current Ransomware Defensive Efforts Are Not Working"

Although there have been some positive developments, ransomware attacks continue to have a significant impact, according to SpyCloud. Infostealer infections preceded 22 percent of ransomware incidents for North American and European ransomware victim organizations in 2023, with common infostealers such as Raccoon, Vidar, and Redline increasing the likelihood. SpyCloud's analysis reveals that Raccoon infostealer malware was involved in 76 percent of infections preceding ransomware attacks.

Submitted by Gregory Rigby on

"Hackers Let Loose on Voting Gear Ahead of US Election Season"

"Hackers Let Loose on Voting Gear Ahead of US Election Season"

In an effort to bolster voting security ahead of the next US Presidential Election, election machine manufacturers are allowing hackers access to their systems. The Election Security Research Forum featured organized penetration testing and bug research for digital scanners, ballot marking devices, and electronic pollbooks, emphasizing the technology that voters may encounter at the polls. The forum also allowed security researchers to interact with system vendors.

Submitted by Gregory Rigby on
Subscribe to