SwRI research engineers, from left, FJ Olugbodi, Mark Johnson and Katherine Kozan demonstrate an adversary-in-the-middle device they developed to test the cyber resiliency of ISO 15118-compliant vehicle-to-grid charging systems. With…
Tag: Security
What’s worse than thieves hacking into your bank account? When they steal your phone number, too
A person uses a cell phone on Saturday, July 13, 2024, in Los Angeles. The FBI Internet Crime Complaint Center reports that SIM-swapping complaints have increased more than 400% from…
Protecting yourself against SIM swapping
A SIM card is shown next to a cellphone in this photo taken on Tuesday, June 11, 2024 in London. Physical SIM cards are going away, replaced by eSIMs which…
US mobile giant AT&T suffers fresh massive data theft
According to AT&T, the data downloaded by the hackers did not include the content of calls and messages, nor personal information such as names or social security numbers. US mobile…
AI can support humanitarian organizations in armed conflict or crisis, but they should understand potential risks
Credit: Pixabay/CC0 Public Domain AI can help humanitarians gain crucial insights to better monitor and anticipate risks, such as a conflict outbreak or escalation. But deploying systems in this context…
Cybercrime groups restructuring after major takedowns: Experts
Law enforcement was able to disrupt the LockBit gang earlier in 2024 and take over much of its network. Cybercrime gangs are looking to rebuild with new tactics after global…
We analyzed the entire web and found a cybersecurity threat lurking in plain sight
Credit: Pixabay/CC0 Public Domain Our latest research has found that clickable links on websites can often be redirected to malicious destinations. We call these “hijackable hyperlinks” and have found them…
US House okays renewal of controversial surveillance program
A part of the US surveillance program known as Section 702 allows intelligence agencies to conduct warrantless electronic monitoring of foreigners outside the United States. The US House of Representatives…
Computer scientists discover gap in the latest security mechanisms used by some chips
Credit: CC0 Public Domain Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely…
Cybersecurity attacks have the potential to infiltrate medical devices and cripple health care, expert warns
Credit: Pixabay/CC0 Public Domain The cyberattack on Change Healthcare last month should serve as a wake-up call for the health care industry, which needs to focus on securing its infrastructure,…