News
  • "Facebook Messenger Bug Allows Spying on Android Users"

    A security researcher at Google Project Zero discovered a vulnerability in the Android version of Facebook Messenger that could allow attackers to spy on users and potentially identify their surroundings without them knowing. The vulnerability existed in…

  • Spotlight on Lablet Research #12 - Operationalizing Contextual Integrity

    Spotlight on Lablet Research #12 - Project: Operationalizing Contextual Integrity  

  • "Disaster Apps Share Personal Data in Violation of Their Privacy Policies"

    Madelyn Sanfilippo, a professor in the School of Information Sciences at the University of Illinois at Urbana-Champaign, and a team of experts examined 15 popular disaster apps. These apps fell into five categories: government agency apps, general…

  • "Cisco Webex Bugs Allow Attackers to Join Meetings as Ghost Users"

    Security researchers from IBM discovered three vulnerabilities in the Cisco Webex video conferencing app. When combined, these vulnerabilities can allow an attacker to join a Webex meeting with full access to audio, video, chats, and screen sharing while…

  • "IoT Cybersecurity Improvement Act Passed, Heads to President’s Desk"

    The IoT Cybersecurity Improvement act recently got the stamp of approval by the U.S. Senate and requires that federal procurement and use of IoT devices must conform to basic security requirements.  The act mandates that NIST must issue standards-…

  • "The Role of Drones in 5G Network Security"

    5G is the fifth generation of wireless technology expected to offer faster speeds, lower latency, increased bandwidth, and other benefits. However, the advancements provided by 5G will be accompanied by new security challenges. Giovanni Geraci, a…

  • "Could Your Vacuum be Listening to You?"

    A team of researchers at the University of Maryland (UMD) captured speech, music, and other sounds by gathering information from a popular vacuum robot's laser-based navigation system and applying techniques in signal processing and deep learning. This…

  • "50% of Advanced Phishing Attacks Evade Leading Secure Email Gateways"

    New research from IRONSCALES reveals that nearly 50% of all advanced phishing attempts such as spear-phishing and social engineering attacks evade Secure Email Gateways (SEGs). Hackers are turning to more complex methods that exploit human nature.…

  • "US Holiday Shoppers Fear Cyber-Scams"

    McAfee commissioned 3Gem to survey 1,000 adults over the age of 18 in the US between October 8 and October 13, 2020. The results of McAfee's "2020 Holiday Season: State of Today's Digital e-Shopper" survey indicate that 36% of American consumers plan on…

  • "ThreatList: Pharma Mobile Phishing Attacks Turn to Malware"

    Adversaries are using mobile phishing attacks to target pharmaceutical companies more frequently since the beginning of COVID-19 and have shifted their focus from credential theft to malware delivery. New research shows that 77 percent of pharmaceutical…

  • "Help Wanted: The Cybersecurity Workforce of the Future Starts with Students Today"

    The growing vulnerability of critical infrastructure systems to cyberattacks calls for more cybersecurity professionals that can help harden and protect them from unauthorized access. The cybersecurity workforce shortage remains as studies show that…

  • "Researchers Warn of Internet Security Risks Connected to Tesla Backup Gateway"

    Rapid7 researchers have brought attention to the security risks that stem from connecting the Tesla Backup Gateway to the internet. The Tesla Backup Gateway is designed to allow the automaker to manage solar and battery/Powerwall installations. It can…