University of Florida cybersecurity professor Kevin Butler developed the framework, which spells out guidance for countries to prevent fraud and abuse on mobile cash apps.
Tag: Hacking
Bytes and Ballots: Cybersecurity expert shares how emerging digital threats could impact democracy
As the 2024 election cycle approaches, concerns about cybersecurity threats to election integrity are mounting. Professor Justin DelVecchio, PhD, a cybersecurity expert from Canisius University, is available to provide insights on emerging threats that could potentially jeopardize the upcoming elections. …
Deprived teens with poor learning skills at greatest risk from email scams, says expert
Disadvantaged teenagers are at greater risk of email scams and need better protection, according to an international study published in the peer-reviewed British Journal of Educational Studies.
Shift to cloud platforms may help to improve security
Cybersecurity experts warn Russia’s premier intelligence agency has launched another campaign to pierce thousands of U.S. government, corporate and think-tank computer networks. Nate Foster is an associate professor of computer science at Cornell University. His research attempts to solve problems…
Director of UCI Cybersecurity Policy & Research Institute available to address recent ransomware attacks.
As the first executive director of the multidisciplinary Cybersecurity Policy & Research Institute at the University of California, Irvine, Bryan Cunningham is focused on solution-oriented strategies to address technical, legal and policy challenges to combat cyber threats, protect individual privacy and civil…
Cybersecurity expert: After Russian hack, common security tools, including cloud-based multi-factor systems, shown to be less effective in preventing attacks
Bertrand Cambou, a professor of nanotechnology and cybersecurity at Northern Arizona University, is available to discuss what went wrong in the Russian hack attack revealed this week and what organizations, including the U.S. government, can learn from the attack. Cambou…
Renowned cybersecurity expert Thomas Holt tracks government hacks in real-time.
Thomas J. Holt is Director and Professor in the School of Criminal Justice at Michigan State University. His research focuses on computer hacking, malware, and the role of the Internet in facilitating all manner of crime and deviance. His work…
Cyber-security, mind-hacking and the presidential election
Ning Zhang, assistant professor of engineering The U.S. presidential election is only weeks away. Hackers are hard at work. What exactly are they doing?We often think of hacking as a shadow form of computer engineering – a matter of ones and zeros, of clever coding and hijacked hardware, of software vulnerabilities and brute force attacks.
Hackers targeting companies that fake corporate responsibility
A new study found some hackers aren’t in it for the money; they want to expose firms that engage in phony philanthropy. These hackers — which include everyone from disgruntled employees to hacktivist groups — can “sniff out” actions that only give the appearance of corporate social responsibility.
Protecting yourself from the latest internet sex crime
Researchers from Michigan State University released a study on “sextortion” – a lesser-known internet crime that poses a threat to adults and minors – that sheds light on the importance of protecting the public from online criminals.
UB School of Management cybersecurity expert offers tips for teleworkers during coronavirus pandemic
BUFFALO, N.Y — The coronavirus pandemic has prompted a dramatic increase in teleworkers, and with it, a whole new world of security vulnerabilities, especially for groups whose infrastructure was not built with significant remote access capabilities in mind. Cybersecurity is…
Some mobile phone apps may contain hidden behaviors that users never see
A team of cybersecurity researchers has discovered that a large number of cell phone applications contain hardcoded secrets allowing others to access private data or block content provided by users.
The study’s findings: that the apps on mobile phones might have hidden or harmful behaviors about which end users know little to nothing.
Media consumption predicts how people think about computer hacking
A recent study from Arizona State University examined the impact of general media consumption on hacking behavior. People who consumed more media thought others were likely to engage in hacking. The punishments associated with hacking had no influence on how people thought about hacking.
The Trouble With Election Security
Russia interfered with the U.S. presidential election in 2016, and in 2018, internet trolls again spread disinformation during the midterms. Intelligence officials warn that interference in this year’s presidential election may already be underway.
‘Surfing attack’ hacks Siri, Google with ultrasonic waves
Using ultrasound waves propagating through a solid surface, researchers at Washington University in St. Louis were able to read text messages and make fraudulent calls on a cellphone sitting on a desk up to 30 feet away.
Researchers Develop Framework that Improves Firefox Security
Researchers from the University of California San Diego, University of Texas at Austin, Stanford University and Mozilla have developed a new framework to improve web browser security. The framework, called RLBox, has been integrated into Firefox to complement Firefox’s other security-hardening efforts.
Why It Matters: Voter, You’ve Been Hacked
The aftershocks of Russia’s interference in the 2016 U.S. election are still being felt today. Is the United States ready for 2020?
Washington University in St. Louis Cybersecurity expert available to talk mobile malware attacks
The Director of the McKelvey School of Engineering’s Cybersecurity Strategic Initiative is available to discuss the many ways we are all vulnerable to cyber attacks on our mobile devices in the wake of the news of the hack into Jeff…
Organized cybercrime – not your average mafia
Research from Michigan State University is one of the first to identify common attributes of cybercrime networks, revealing how these groups function and work together to cause an estimated $445-600 billion of harm globally per year.
STRATEGIES TO LOWER RISK FOR VIOLENT CRIME AND GUN VIOLENCE
With violent crimes and gun violence rising annually and the number of gun deaths in the U.S. surpassing all other nations, researchers at the annual meeting of The Society for Risk Analysis (SRA) present a series of studies during its Study of Violent Crime and Gun Violence symposium which contributes several new frameworks that can be used toward improving laws, civilian strategies, legislation and police response, as well as the overall study of risk in society. The Symposium will occur on Monday, December 9 at 10:30 at the Crystal Gateway Marriott in Arlington, Virginia.
Design flaw could open Bluetooth devices to hacking
Mobile apps that work with Bluetooth devices have an inherent design flaw that makes them vulnerable to hacking, new research has found.
Interdisciplinary cyberengineering team wins $6M grant to develop computing solutions to combat cyberattacks
Funded by the Air Force Research Lab, the team of scientists from Northern Arizona University aims to increase computing diversity among hardware and software, making them nearly impossible to hack.
Here’s the kind of data hackers get about you from hospitals
New research from Michigan State University and Johns Hopkins University is the first to uncover the specific data leaked through hospital breaches, sounding alarm bells for nearly 170 million people.
Decoding how kids get into hacking
New research from Michigan State University is the first to identify characteristics and gender-specific behaviors in kids that could lead kids to become juvenile hackers.
Researchers Hack One of the World’s Most Secure Industrial Programmable Logic Controllers (PLC)
Israeli researchers have managed to take control of a Siemens programmable logic controller (PLC), considered to be one of the safest controllers in the world. PLCs are used in a wide spectrum of operations including power stations, water pumps, vehicles, and smart homes.
Researchers Hack One of the World’s Most Secure Industrial Programmable Logic Controllers (PLC)
Israeli researchers have managed to take control of a Siemens programmable logic controller (PLC), considered to be one of the safest controllers in the world. PLCs are used in a wide spectrum of operations including power stations, water pumps, vehicles, and smart homes.