Cybersecurity Center Article Archive

The Cybersecurity Center at Purdue Global has compiled a list of cyber defense articles. Read on to learn more about current trends and challenges in the cybersecurity industry.

Google Sees Surge in State-Backed Hacking

May 28, 2020

State-backed cyberattacks in April, predominantly hacking and phishing attempts claiming to be the World Health Organization, led Google to send warnings to more than 1,700 user accounts.

Bluetooth Bugs Allow Impersonation Attacks on Legions of Devices

May 19, 2020

Academic researchers have discovered many unpatched security bugs in Bluetooth Classic that enable attackers to spoof paired devices, on everything from phones to laptops to Internet of Things gadgets, allowing hackers to acquire sensitive data.

How to Become a Cybersecurity Pro: A Cheat Sheet

May 16, 2019

If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field. As cybercriminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are currently nearly 3 million unfilled cybersecurity jobs worldwide, ISC(2) found.

CISOs Can’t Find the Right People

May 15, 2020

A recent international study of security leaders found that the top barrier to cybersecurity strategy execution is skills shortage, with many respondents saying they struggle to source cybersecurity talent. Other major difficulties included budget, board level buy-in, and technology.

A Guide to Pandemic Scams, and What Not to Fall For

May 13, 2020

The uncertainty surrounding the coronavirus pandemic has created many opportunities for hackers and fraudsters. Vulnerabilities include stimulus checks, unemployment benefits, and personal tech devices.

A National Security Research Agenda for Cybersecurity and Artificial Intelligence—Center for Security and Emerging Technology Issue Brief

May 1, 2020

Machine learning can be easy to overlook as a matter of national security, but an artificial intelligence research agenda should consider its different components and possibilities, in conjunction with already-specified technical questions about cybersecurity and computer vulnerabilities.

The Art of Non-Verbal Communication in a Video Conferencing World

April 27, 2020

Much of our communication comes in non-verbal forms such as gestures and body language. Although it can be tricky as video conferencing becomes more popular, becoming familiar and fluent in all forms of communication can improve business interactions.

Hackers Hijack Routers to Spread Malware Via Coronavirus Apps

March 26, 2020

Cybercriminals are redirecting routers to lure victims to attacker-controlled sites promoting fake coronavirus information apps that use the Oski malware to steal information. The number of victims has grown in recent weeks, demonstrating hackers’ creativity in leveraging the coronavirus pandemic.

AI, IoT, Blockchain, and Drones: The Many Use Cases of Emerging Tech

March 17, 2020

At the virtual CompTIA Communities and Councils Forum, held March 17, four experts from CompTIA’s Industry Advisory Councils discussed emerging technology use cases during the session, "How Emerging Technologies are Delivering Business Outcomes." James Stanger, chief technology officer at CompTIA, moderated the expert panel that included Lloyd Danzig, chairman and founder, ICED(AI); Deborah Kestin-Schildkraut, IBM blockchain and global alliances ecosystem marketing leader, IBM; Ted Parisot, co-founder, Helios Visons; and Jill Klein, IoT practice lead, Sirius Computer Solutions.

Cybercriminals Raking in $1.5 Trillion Every Year

March 12, 2019

Research from Atlas VPN found that criminals' net proceeds outpace the revenue made by tech giants each year. Cybercriminals are now making more than billion-dollar corporations according to a new study from Atlas VPN. Researchers from the company found that cyberattacks are helping criminals in total to make more than $1.5 trillion in revenue each year, which is the three times the $514 billion Walmart makes annually.

Focus on Data Drives Changes for Computer Networking

January 29, 2020

In a business environment dominated by discussions on emerging technology, it can be easy to forget that IT systems have many different components. It can also be easy to forget that the components outside of the spotlight are actually the ones that support the shiny new solutions. Infrastructure such as servers, cybersecurity and first-line IT support continue to be critical areas for any business trying to accelerate their technology strategy.

Is Your Business Ready for IoT, AI, and 5G?

January 28, 2020

Change is a way of life for solution providers. Or should be. Something new is always on the horizon, and the horizon keeps getting closer. These days change looms in the form of three emerging technologies—internet of things (IoT), artificial intelligence (AI) and 5G connectivity.

Fake Amazon Representatives Involved in England’s Phone Scam

January 27, 2020

Scammers recently cheated more than 200 people in England by posing as Amazon representatives over the phone and offering them a variety of free services. Victims were convinced to download harmful software onto their computers and post their bank account information.

What Is Smishing, and How Do You Protect Yourself?

January 24, 2020

Beware of scam text messages the same way you would for phishing emails. “Smishing” messages hope to trick you into clicking on a link and sharing sensitive information or downloading potentially harmful software.

Fake Smart Factory Honeypot Highlights New Attack Threats

January 24, 2020

A fake website designed to lure cybercriminals (also known as a honeypot) observed several threats to industrial control systems over its several months of operation. The fake website included all the online workings of a factory, complete with website, and made intentional security mistakes to mimic a business with limited IT staff.

Privacy Takes a Hit, as Storage Bucket Leaks Cannabis Dispensary POS Data

January 23, 2020

Point-of-sale information from several cannabis dispensaries was discovered to have leaked from an exposed Amazon Web Services storage bucket. Scanned government and employee photo IDs and dispensary visitor and patient signatures were among the exposed content.

Getting Into Cybersecurity: Why It’s Great to Start at the Help Desk

January 22, 2020

A common misconception is that cybersecurity is an entry-level job. While that can be true to a certain extent, when it comes to working on a first-level support team, landing a cybersecurity job comes down to how mature the company’s processes and procedures are.

The Merging of IT and OT and Utilizing Digital Twin Technology

January 22, 2020

In an interview, consultant Ryan Morris posits that conversations about the Internet of Things must also incorporate operational technology (OT), such as how building infrastructure and machinery can be integrated with information technology (IT) to explore new market opportunities.

South Carolina Water Supplier Targeted in “International Cyberattack

January 22, 2020

Greenville Water, a water supplier to about a half-million residents in South Carolina, suffered what it called “an international cyberattack” in early 2020. The attack knocked out online and pay-by-phone systems, but did not affect water delivery.

Phishing Campaign Leads to UPS Store Data Breach

January 22, 2020

The UPS Store disclosed in early 2020 that several store locations’ email accounts were accessed by an unauthorized party using a phishing scheme. No evidence of misuse of information has been found yet, and the UPS Store claimed that only a “small percentage” of stores were affected.

From AI to Workforce: 10 Initiatives We're Excited About in 2020

January 7, 2020

CompTIA has a lot coming down the pipe in the business of technology for 2020, including new advisory councils discussing goals and emerging technologies, a broad workforce community, and international expansion.

More Cybersecurity Articles