Cybersecurity Center Article Archive

The Cybersecurity Center at Purdue Global has compiled a list of cyber defense articles. Read on to learn more about current trends and challenges in the cybersecurity industry.

Zoom Bug Meant Attackers Could Brute Force Their Way Into Password-Protected Meetings

July 30, 2020

Zoom has taken action after a security flaw was found that allowed hackers to quickly break into private, password-protected video calls. The problem centered on meetings’ six-digit numeric passcodes, for which computers would have no problem brute-forcing the correct combination.

8 Cybersecurity Themes to Expect at Black Hat USA 2020

July 23, 2020

Black Hat USA 2020 is still going on virtually during the COVID-19 pandemic, and organizers plan to deliver their traditional content. Topics to receive major attention this year include remote work, the cloud, and the presidential election.

Q&A: How Systemic Racism Weakens Cybersecurity

July 22, 2020

Camille Stewart, Google’s head of security policy for Google Play and Android, is an attorney and national security and foreign policy expert; she recently spoke about how systemic racism undermines security, users, and organizations, and how security professionals can build a more representative workforce.

Is Your Chip Card Secure? Much Depends on Where You Bank

July 20, 2020

Credit and debit cards have been integrating chips to prevent skimming devices from stealing data when users swipe their card. Recent malware attacks on U.S.-based merchants, however, indicate that hackers are discovering workarounds to sidestep these security features.

CyberSeek™ Data Confirms the Ever-Present Need to Expand Cybersecurity Talent Pipeline

July 15, 2020

Cybersecurity professions were in high demand, as U.S. employers advertised more than 500,000 job openings from June 2019 to May 2020. Data compiled by CyberSeek, a cybernetics workforce analytics source, demonstrates the necessity of remote work during the COVID-19 pandemic.

In an Increasingly Complex World, AI Is the Only Way Forward

July 1, 2020

As the technology world expands, artificial intelligence must expand even faster to keep up. The complexity that the future requires will require equally rigorous AI-driven security systems for protection.

UCSF Pays Cybercriminals $1.14 Million to Recover Files After Ransomware Attack

June 29, 2020

In June 2020, the University of California San Francisco partially contained a ransomware attack that affected some servers within the School of Medicine. The UCSF later admitted that it paid about $1.14 million to the perpetrators to recover data that had been compromised during the attack.

Hackers Target Online Stores With Web Skimmer Hidden in Image Metadata

June 26, 2020

An image file was the carrier for a hidden web skimmer used by a cybercriminal group to carry malicious code and steal data from compromised ecommerce websites. Image files have previously been used to hide skimmers, though it is unusual for them to also exfiltrate stolen data.

Using AI in Cyber Security

June 23, 2020

Artificial intelligence is expected to have a large impact in battling cybersecurity threats, strengthening password protections, detecting new cyber-attacks and phishing attempts, and automating security processes.

The Future of Ransomware Is in the Cloud

June 19, 2020

As cloud services have become more important for successful businesses, particularly in light of the coronavirus pandemic, cybercriminals have followed in search of new opportunities, and it’s only a matter of time before ransomware evolves and grows to target cloud data.

Creativity and Diversity Needed to Close the Cybersecurity Skills Gap

June 19, 2020

The Fortinet Survey Report released in early 2020 documents a worldwide gap in cybersecurity skills. The report illustrates the enormous impact of this shortage and gathers thoughts from executives and security personnel.

How to Calculate the Cost of a Cyberattack

June 18, 2020

Even a smaller cyberattack can be devastating for a company, affecting reputation and business opportunities beyond the financial loss. Hidden costs that are not always obvious include inefficiencies, unexpected downtime, and IT failure.

4 Ways to Be More Strategic With IT

June 17, 2020

The pandemic has caused many companies to change over to remote work and alter business operations, a full-time job for IT professionals. This seismic shift has revealed several lessons that companies can learn from this, as well as what can be done to alleviate future concerns.

10 Emerging Technologies Making an Impact in 2020

June 10, 2020

Artificial intelligence, blockchain, and quantum computing are among several technologies expected to have a lot of potential for business impact in the near future.

2020 Emerging Technology Top 10 List

June 3, 2020

A variety of technologies with both short- and long-term potential are positioned to have enormous impact in 2020, including artificial intelligence, serverless computing, and 5G.

Five Best Practices for Managing Your Business through a Crisis or Disaster

May 31, 2020

In an unexpected crisis, IT solution providers need to know where to focus their efforts. Careful handling of customers, employees, and other business concerns can be crucial when encountering both immediate needs and more long-term concerns.

Google Sees Surge in State-Backed Hacking

May 28, 2020

State-backed cyberattacks in April, predominantly hacking and phishing attempts claiming to be the World Health Organization, led Google to send warnings to more than 1,700 user accounts.

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices

May 19, 2020

Academic researchers have discovered many unpatched security bugs in Bluetooth Classic that enable attackers to spoof paired devices, on everything from phones to laptops to Internet of Things gadgets, allowing hackers to acquire sensitive data.

How to Become a Cybersecurity Pro: A Cheat Sheet

May 16, 2019

If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field. As cybercriminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs worldwide, ISC(2) found.

CISOs Can’t Find the Right People

May 15, 2020

A recent international study of security leaders found that the top barrier to cybersecurity strategy execution is skills shortage, with many respondents saying they struggle to source cybersecurity talent. Other major difficulties included budget, board level buy-in, and technology.

A Guide to Pandemic Scams, and What Not to Fall For

May 13, 2020

The uncertainty surrounding the coronavirus pandemic has created many opportunities for hackers and fraudsters. Vulnerabilities include stimulus checks, unemployment benefits, and personal tech devices.

A National Security Research Agenda for Cybersecurity and Artificial Intelligence—Center for Security and Emerging Technology Issue Brief

May 1, 2020

Machine learning can be easy to overlook as a matter of national security, but an artificial intelligence research agenda should consider its different components and possibilities, in conjunction with already-specified technical questions about cybersecurity and computer vulnerabilities.

The Art of Non-Verbal Communication in a Video Conferencing World

April 27, 2020

Much of our communication comes in non-verbal forms such as gestures and body language. Although it can be tricky as video conferencing becomes more popular, becoming familiar and fluent in all forms of communication can improve business interactions.

Hackers Hijack Routers to Spread Malware Via Coronavirus Apps

March 26, 2020

Cybercriminals are redirecting routers to lure victims to attacker-controlled sites promoting fake coronavirus information apps that use the Oski malware to steal information. The number of victims has grown in recent weeks, demonstrating hackers’ creativity in leveraging the coronavirus pandemic.

AI, IoT, Blockchain, and Drones: The Many Use Cases of Emerging Tech

March 17, 2020

At the virtual CompTIA Communities and Councils Forum, held March 17, four experts from CompTIA’s Industry Advisory Councils discussed emerging technology use cases during the session, "How Emerging Technologies are Delivering Business Outcomes." James Stanger, chief technology officer at CompTIA, moderated the expert panel that included Lloyd Danzig, chairman and founder, ICED(AI); Deborah Kestin-Schildkraut, IBM blockchain and global alliances ecosystem marketing leader, IBM; Ted Parisot, co-founder, Helios Visons; and Jill Klein, IoT practice lead, Sirius Computer Solutions.

Cybercriminals Raking in $1.5 Trillion Every Year

March 12, 2019

Research from Atlas VPN found that criminals' net proceeds outpace the revenue made by tech giants each year. Cybercriminals are now making more than billion-dollar corporations according to a new study from Atlas VPN. Researchers from the company found that cyberattacks are helping criminals in total to make more than $1.5 trillion in revenue each year, which is the three times the $514 billion Walmart makes annually.

Focus on Data Drives Changes for Computer Networking

January 29, 2020

In a business environment dominated by discussions on emerging technology, it can be easy to forget that IT systems have many different components. It can also be easy to forget that the components outside of the spotlight are actually the ones that support the shiny new solutions. Infrastructure such as servers, cybersecurity and first-line IT support continue to be critical areas for any business trying to accelerate their technology strategy.

Is Your Business Ready for IoT, AI, and 5G?

January 28, 2020

Change is a way of life for solution providers. Or should be. Something new is always on the horizon, and the horizon keeps getting closer. These days change looms in the form of three emerging technologies—internet of things (IoT), artificial intelligence (AI) and 5G connectivity.

Fake Amazon Representatives Involved in England’s Phone Scam

January 27, 2020

Scammers recently cheated more than 200 people in England by posing as Amazon representatives over the phone and offering them a variety of free services. Victims were convinced to download harmful software onto their computers and post their bank account information.

What Is Smishing, and How Do You Protect Yourself?

January 24, 2020

Beware of scam text messages the same way you would for phishing emails. “Smishing” messages hope to trick you into clicking on a link and sharing sensitive information or downloading potentially harmful software.

Fake Smart Factory Honeypot Highlights New Attack Threats

January 24, 2020

A fake website designed to lure cybercriminals (also known as a honeypot) observed several threats to industrial control systems over its several months of operation. The fake website included all the online workings of a factory, complete with website, and made intentional security mistakes to mimic a business with limited IT staff.

Privacy Takes a Hit, as Storage Bucket Leaks Cannabis Dispensary POS Data

January 23, 2020

Point-of-sale information from several cannabis dispensaries was discovered to have leaked from an exposed Amazon Web Services storage bucket. Scanned government and employee photo IDs and dispensary visitor and patient signatures were among the exposed content.

Getting Into Cybersecurity: Why It’s Great to Start at the Help Desk

January 22, 2020

A common misconception is that cybersecurity is an entry-level job. While that can be true to a certain extent, when it comes to working on a first-level support team, landing a cybersecurity job comes down to how mature the company’s processes and procedures are.

The Merging of IT and OT and Utilizing Digital Twin Technology

January 22, 2020

In an interview, consultant Ryan Morris posits that conversations about the Internet of Things must also incorporate operational technology (OT), such as how building infrastructure and machinery can be integrated with information technology (IT) to explore new market opportunities.

South Carolina Water Supplier Targeted in “International Cyberattack

January 22, 2020

Greenville Water, a water supplier to about a half-million residents in South Carolina, suffered what it called “an international cyberattack” in early 2020. The attack knocked out online and pay-by-phone systems, but did not affect water delivery.

Phishing Campaign Leads to UPS Store Data Breach

January 22, 2020

The UPS Store disclosed in early 2020 that several store locations’ email accounts were accessed by an unauthorized party using a phishing scheme. No evidence of misuse of information has been found yet, and the UPS Store claimed that only a “small percentage” of stores were affected.

From AI to Workforce: 10 Initiatives We're Excited About in 2020

January 7, 2020

CompTIA has a lot coming down the pipe in the business of technology for 2020, including new advisory councils discussing goals and emerging technologies, a broad workforce community, and international expansion.

More Cybersecurity Articles