Can You Trust This App?

Sonia Fernandez

Smartphone hacking is one of the fastest-growing issues in terms of cybersecurity, he said, especially with the advent of cloud storage. In Europe, and increasingly in the United States, hackers are able to bypass two-stage identification, whereby a text message is sent to one’s smartphone bearing a private code for entry into account websites. It is a problem that Vigna, computer science professor Christopher Kruegel and researchers from Northwestern University are getting ready to tackle with funding from a $1.4 million grant from the National Science Foundation.

Welcome to the World of (Not So) Anonymous Hackers

Yolian Cerquera

With a memorable tagline, a vast media presence, and an identifiable brand name and logo (a suit without a head, and if ever in public—a Guy Fawkes mask), Anonymous was named in 2012 one of Time’s 100 Most Influential People. Its method of procedure involves “trolling”, or bullying, Web page defacement, threatening emails, leaking confidential information, and a plethora of other tactics that stem from one objective—to battle what it deems unjust or evil through unity and elaborate pranks. 

Uproar Over Alleged Chinese Internet Attacks Has Cybersecurity Community on Alert

George Koo and Ling-chi Wang

Despite Bloomberg Businnessweek's accusation that the Chinese army is spying on Americans, the report that led to the charges has serious flaws. These raise troubling questions about a repetition of  the "China spy syndrome." Beginning with The New York Times January 30 disclosure of Chinese hacking, every publication of note or of little note has since run one or more stories on cyber attacks emanating from China. 

Subscribe to RSS - hacking