CyberSecurity

By shornik | A collection of stories related to technology vulnerabilities, exploits and preventive controls by Dr. Steven Hornik as curated by University of Central Florida Advanced Accounting Information System graduate students.

Facebook's new tool looks to replace traditional two-factor authentication

Facebook today announced a new means of securing your online accounts. Delegated Recovery, as it’s being called, looks to be a step forward for those afraid of losing their devices when using two-factor authentication (2FA) — which, should be most of us.<p>Facebook security engineer Brad Hill …

Security

What Massive Hacking Attacks Can Teach Us About Cyber Security

Hackers hit Russian bank customers, planned international cyber raids

MOSCOW (Reuters) - Russian cyber criminals used malware planted on Android mobile devices to steal from domestic bank customers and were planning to target European lenders before their arrest, investigators and sources with knowledge of the case told Reuters.<p>Their campaign raised a relatively …

Banking

Malware Network Communication Provides Better Early Warning Signal

Research is expected to be unveiled today that challenges current reliance on dynamic malware analysis as the best means of early detection of …

Information Security

Untraceable Coins Storming Into Top 10 Cryptocurrencies - Bytecoin Surge

Bytecoin, an untraceable privacy-preserving cryptocurrency, has just seen an astronomical triple-digit percent surge in price. The cryptocurrency …

Cryptocurrency

Cyber attacks are costly and dangerous

Officials estimate global financial losses resulting from the computer hack to total more that $4 billion. But it's not just an economic problem. …

Cybersecurity

Why the U.S. government needs its own IT agency

The technology used by the Department of Treasury to track taxpayer accounts is 57 years old -- old enough to have been born and taken early retirement.<p>This is one example of the U.S. government relying on tech that's so old people have to learn specialized skills just to use it.<p>Most of the tech …

United States

The cruellest office prank: Changing your colleague's PC wallpaper to WannaCry

It's the sight many office workers would dread after coming into work on a Monday morning: the red WannaCry ransomware taking over their computer.<p>The cyber attack, which locks a computer's files and demands they pay hundreds of pounds in Bitcoin, sparked a global security crisis earlier this month, …

Cyberattack

Study: Seriously, Nobody Cares About Cybersecurity Despite the Risks

With hackers holding Netflix series hostage, ransoming off personal information, and generally mucking up the digital world with DDoS attacks, …

Cybersecurity

Subtitle Hack Leaves 200 Million Vulnerable to Remote Code Execution

A proof of concept attack using malicious video subtitle files reveals how adversaries can execute remote code on PCs, Smart TVs and mobile devices …

Subtitles Open You Up to Hackers When Using Popular Media Players

On Tuesday, security research firm Checkpoint announced that its team had discovered a new vulnerability in numerous media players that allows a …

Information Security

It’s Time to Speak the Same Language on Cybersecurity

At the AICPA, we saw the emerging market need several years ago. We recognized that there hasn’t been a consistent, common language for describing …

Cybersecurity

Samsung Galaxy S8 Iris scanner can be hacked

A group of hackers was able to defeat the iris scanner in the Samsung Galaxy S8 smartphone using relatively common supplies, creating concerns that …

Movie Subtitles Can Let Hackers Attack Your PC

A security vulnerability in the way that popular video players like VLC and Kodi load third-party subtitles has been brought to light by Israeli …

Popcorn Time

Why Is Cybersecurity So Hard?

After nearly 20 years of trying and billions of dollars in investment, why are organizations are still struggling with cybersecurity? In fact, the problem seems to be getting worse, not better. Answering this question requires moving beyond a purely technical examination of cybersecurity. It’s true …

Cybersecurity

Chinese cybersecurity firm ‘develops vaccine for all ransomware viruses’

In the wake of the WannaCry global cyberattack, a Chinese cybersecurity firm claims to have developed a “vaccine” for all ransomware virus that will …

Cybersecurity

Google starts tracking your offline shopping — what you buy at stores, in person

Google already monitors your online shopping — but now it's also keeping an eye on what you're buying in real-world stores as part of its latest effort to sell more digital advertising.<p>The offline tracking scans most credit and debit card transactions to help Google automatically inform merchants …

Google

More malware is making the rounds -- but this time it's invisible

There's another strain of malware infecting computers, but this one you can't see.<p>Instead of a red ransom note -- the calling card of the massive WannaCry infection -- this newly-discovered malware isn't noticeable, beyond making a computer run more slowly than usual.<p>Called "Adylkuzz," the malware …

Cybersecurity

1Password Gains 'Travel Mode' to Protect Sensitive Data When Traveling

AgileBits recently introduced a new 1Password feature called Travel Mode, which is designed to protect password vaults from unwarranted searches when traveling.<p>When activated, Travel Mode will remove every password vault from all of a user's iOS and Mac devices except for vaults that have been …

Mac App Store

Disney, Netflix’s response to hackers is cool, calm and unsurprising

There’s a reason for it<p>Disney has become the latest company to come under threat from hackers over an early release of one of their movies, but it’s the response to the potential leak that’s most interesting. Mainly because it’s eerily similar to the response that Netflix gave to hackers when the …

Walt Disney Company

Canada’s spies examining ‘vulnerabilities’ in election system

OTTAWA–The Communications Security Establishment has begun a promised review into the risks of foreign interference in the 2019 election, the Star …

Emmanuel Macron

Why do we need 'accidental heroes' to deal with global cyber-attacks?

Big tech firms say they are the only providers of large cybersecurity services – even as their products are compromised. The conflict of interest is huge<p>To appreciate the perversity of our reliance on US technology giants, you just need to grapple with the fact that one of the likely winners in the …

Cybersecurity

Yahoo retires ImageMagick library after 18-byte exploit leaks user email content

The simple line of code made it possible for attackers to view private Yahoo Mail images.<p>Yahoo has decided to retire the use of the ImageMagick …

Security

The World's First Robot Police Officer Just Debuted in Dubai

Robocop utilizes the internet of things to catch offenders and detect emotions.<p>From fast food cooks to concierges at restaurants and hotels, robots are slowly infiltrating the workforce in nearly every industry. Most recently, the world welcomed its first operational robot policeman.<p>“Robocop,” the …

Robots

What is Unit 180 and why is it one of the biggest threats to world peace?

North Korea’s main spy agency has a special cell called Unit 180 that is likely to have launched some of its most daring and successful cyber …

North Korea