Security

The Nigerian Prince has evolved: email scams now even fool cybersecurity experts

We all like to think we’re immune to scams. We scoff at emails from an unknown sender offering us £2 million, in exchange for our bank details. But the game has changed and con artists have developed new, chilling tactics. They are taking the personal approach and scouring the internet for all the details they …

The Nigerian Prince has evolved: email scams now even fool cybersecurity expertsLire plus »

Don’t assume your user data in the cloud is safe

The Research Brief is a short take about interesting academic work. The big idea Organizations’ failure to properly manage the servers they lease from cloud service providers can allow attackers to receive private data, research my colleagues and I conducted has shown. Cloud computing allows businesses to lease servers the same way they lease office …

Don’t assume your user data in the cloud is safeLire plus »

Your digital footprints could help hackers infiltrate computer networks

When you use the internet, you leave behind a trail of data, a set of digital footprints. These include your social media activities, web browsing behavior, health information, travel patterns, location maps, information about your mobile device use, photos, audio and video. This data is collected, collated, stored and analyzed by various organizations, from the …

Your digital footprints could help hackers infiltrate computer networksLire plus »

Hackers are targeting US local governments — and it’s time to fight back

President Joe Biden on March 21, 2022, warned that Russian cyberattacks on U.S. targets are likely, though the government has not identified a specific threat. Biden urged the private sector: “Harden your cyber defenses immediately.” It is a costly fact of modern life that organizations from pipelines and shipping companies to hospitals and any number …

Hackers are targeting US local governments — and it’s time to fight backLire plus »

Who is Lapsus$, the theatrical cyber gang that attacked Okta, Samsung, and Microsoft?

A cybercrime gang called Lapsus$ is tearing through tech giants around the world. In the last few months alone, the group has claimed the scalps of Nvidia, Ubisoft, Samsung, Okta, and Microsoft. Their brazen tactics have attracted a large following — and some powerful enemies. Here’s what we know about the digital extortionists. Who are …

Who is Lapsus$, the theatrical cyber gang that attacked Okta, Samsung, and Microsoft?Lire plus »

Digital sleuths are changing the course of the Ukraine war

For months now, a large and very active community of digital sleuths has been closely tracking the escalating crisis in Ukraine. These people have been using open-source intelligence to investigate and document the build-up to – and now the execution of – Vladimir Putin’s war of choice. But what exactly is open-source intelligence? And how …

Digital sleuths are changing the course of the Ukraine warLire plus »

The next big cybersecurity threat is connected SaaS platforms

This article was originally published on Built In by Aner Gelman. Text notifications about new messages on Slack. Linking Trello boards to Microsoft Teams. Using Boomerang to control a busy inbox. These apps and platforms — and their connections with each other — are all part of daily life in many companies today. They not …

The next big cybersecurity threat is connected SaaS platformsLire plus »

Anonymous called on its global hacker army to attack Russia — do they stand a chance?

A spate of cyber attacks has affected Ukraine’s digital systems since Russia’s invasion began. It soon became clear Russia’s “boots on the ground” approach would be supplemented by a parallel cyber offensive. Last week Ukraine called on its citizens to take to their keyboards and defend the country against Russia’s cyber threat. At the same …

Anonymous called on its global hacker army to attack Russia — do they stand a chance?Lire plus »

Amidst the Russian invasion, Ukraine’s also fighting cyberattacks — here’s what you need to know

This morning, Russian President Vladimir Putin ordered “a special operation,” allowing armed forces to move into Ukraine. The offensive wasn’t just limited to military forces, as Ukraine faced major internet disruptions. In this story, we’ll aim to summarize how information flow in the war-affected country has taken a hit. Cyberattacks Yesterday, the State Service for …

Amidst the Russian invasion, Ukraine’s also fighting cyberattacks — here’s what you need to knowLire plus »

Protect biomedical data from hackers by treating the problem like a game

The big idea Game theory, which tries to predict how the behavior of competitors influences the choices the other players make, can help researchers find the best ways to share biomedical data while protecting the anonymity of the people contributing the data from hackers. Modern biomedical research, such as the National COVID Cohort Collaborative and …

Protect biomedical data from hackers by treating the problem like a gameLire plus »