Our phones are almost always tracking our location, even with the GPS services turned off. This is because to receive service, our phones disclose personal identifiers to cell towers owned by major network operators. This has resulted in a large…
Category: Security
New Research Sheds Light on Kids’ Password Behavior
Passwords are necessary for security and managing our online accounts ranging from emails to our social media profiles. To reduce the risk of cyberattacks, it is important that there be training and education for strengthening passwords and protecting our accounts.…
New System Hack for Windows Hello
A key piece of the tech industry’s plan to make the world password-less and safer is biometric authentication. However, a novel method for bypassing Microsoft’s Windows Hello facial recognition system shows that a little fiddling with the hardware can deceive…
Crucial Agreement Reached Between EU and UK Regarding Data Protection
On Monday, the European Union officially recognized the privacy rules of Britain as sufficient on its own, which will allow EU-U.K. data flows persist after Brexit. The executive arm of EU, the European Commission stated that this decision meant that…
Vulnerabilities in Card Reader Technology Crashes POS and ATMs
Security researchers and cyberattackers have hacked ATMs using all kinds of methods, from sticking a thumb drive into a USB port to drilling a hole to reveal internal wiring. Recently, a research discovered a collection of bugs allowing him to…
New Report says Average Time to Fix Cybersecurity Vulnerabilities is 205 Days
New reports emerging from WhiteHat Security suggests that the average time it takes to fix critical cybersecurity problems has increased from 197 days in April 2021 to 205 days in May 2021. Whitehat researchers found that organizations in the…
Massive Manipulation of Twitter Trends Discovered
New EPFL research focused on Turkey from the Distributed Information Systems Laboratory, a part of the School of Computer and Communication Sciences discovered a vulnerability in the algorithm which decides Twitter Trending Topics (it doesn’t take deletions into account). This…
Massive Demand for Cybersecurity Professionals in the U.S.
According to trade group CompTIA and Cyber Seek — a tech job-tracking database from the U.S. Commerce Department — there are over 465,000 vacancies for jobs in cybersecurity nationwide as of May 2021. Experts say the need for more web-inclined…
Artists and Activists Urge Spotify to Rule Out “Invasive” Voice Recognition Technology
A coalition of musicians and human rights groups persuaded music streaming company Spotify to secure against possible use of speech recognition tool it recently developed to suggest songs— painting the technology as ‘creepy’ and ‘invasive’. Earlier this year, Sweden-based Spotify…
New Report Finds that School Apps are Sharing Students’ Data with Third Parties
During the COVID-19 pandemic, educational institutions shifted their services to the digital world in an unprecedented rate to educate students safely. These digital tools have taken up the students’ data, suffered security breaches and generally mishandled their students’ personal…