Many major corporations are now talking about fake news and misrepresentative content and how important it is to fight against it. But intentionally or not, these same corporations are actually helping fund sites that traffic false news by placing ads on them. In the not-so-distant past, media advertising was much simpler. All that the companies …
Author Archives: cwlee20
WhatsApp Messages Could be Vulnerable to Snooping
According to a report in The Guardian newspaper, WhatsApp messages could be vulnerable to interception. It appears that due to their encryption techniques and a security backdoor, WhatsApp messages could be read without its users knowing. The facebook-owned app relies on an encryption method that uses unique security keys within the Signal protocol that are …
Continue reading “WhatsApp Messages Could be Vulnerable to Snooping”
Don’t Be So Confident When it Comes to Phishing Emails
A new study conducted by the researchers at the University of Texas at San Antonio reveals that overconfident email recipients are actually helping phishing succeed. So when it comes to phishing scams, being under confident is a good strategy to follow. The problem with phishing emails and overconfidence lies in the fact that most people …
Continue reading “Don’t Be So Confident When it Comes to Phishing Emails”
Secure Quantum-Based Data Encryption
In the inevitable and not-so-far quantum-future that awaits us, quantum encryption techniques will be of utmost importance. They use individual photons as an extremely secure way to encode data, but as with any other encryption method, there is a downside to a quantum encryption too, which is the disability to emit photons at high rates. …
New Tool for Detecting Fake News
Researchers at the Indiana University have launched a powerful new tool called Hoaxy in the fight against fake news. The new tool works by visualizing how claims in the news spread through social networks, and by fact checking some of those claims. Because of the rapid growth of fake news that sometimes has the power to sway …
VTT Develops Tailored Solutions for Improved Cybersecurity
Together with the National Emergency Supply Agency and the private sector, VTT Technical Research Centre of Finland has created tailored solutions for improved cybersecurity and disruption-free operations for manufacturers. This, now ending KYBER-TEO project, will make companies and manufacturers more able to defend themselves from possible cyber attacks. As you know, a cyber attack can …
Continue reading “VTT Develops Tailored Solutions for Improved Cybersecurity”
Google is Upping Security by Checking Cryptography Libraries
Google has announced the launch of the Project Wycheproof that includes more than 80 test cases and targets cryptography problems. Named after the smallest mountain in the world, Moun Wycheproof, this project’s main motivation is to have an achievable goal – “the smaller the mountain the easier it is to climb it!”. As Google’s security …
Continue reading “Google is Upping Security by Checking Cryptography Libraries”
Malware Hidden Within Ad Images
Antivirus firm ESET recently released a report stating that its researchers have discovered a new exploit kit spreading via malicious ads on many reputable and popular websites. Since October this year, these malicious ads have been displayed to more than a million web surfers who use Internet Explorer browser. ESET researchers say that the cybercriminals …
New Program Continuously Shuffles Code for Safety
Although artificial intelligence is constantly improving, we’re still far from it writing software. For now, we, human beings, are the only ones that know how to write software, and while we can be excellent at it, we’ll never be perfect. This means that there will always be at least few coding mistakes that malicious hackers …
Continue reading “New Program Continuously Shuffles Code for Safety”
Malware That Can Turn Your PC Into an Eavesdropping Device
A team of researchers at Ben-Gurion University of the Negev has found malware that can turn conventional computers into perpetual eavesdropping devices – even without a microphone. In a paper “SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit,” the team demonstrates how most computers and laptops today are susceptible to this kind of attack. …
Continue reading “Malware That Can Turn Your PC Into an Eavesdropping Device”