Security News
![Amid Privacy Firestorm, Facebook Curbs Research Tool](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Facebook has curbed access to a controversial feature allowing searches of the vast content within the social network -- a tool which raised privacy concerns but was also used for research and...
![New research generates deepfake video from a single picture](/static/build/img/news/alt/web-statistics-small.jpg)
Now it's easier for attackers to produce deepfakes, even if the target doesn't have much existing footage. Like the Mona Lisa.
![Research Shows Twitter Manipulation in Weeks Before EU Elections](/static/build/img/news/alt/Geopolitical-Cybersecurity-Predictions-2-small.jpg)
This is an age of large scale political social engineering through social media, both by advertising and the presentation of misleading data. International social engineering became frontpage news...
![Attackers Could Use Mobile Device Sensors to Generate Unique Device Fingerprint: Research](/static/build/img/news/alt/Data-Cybersecurity-Predictions-small.jpg)
Researchers at Cambridge University have determined that attackers could use the built-in motion sensors in mobile devices to generate a unique device fingerprint. read more
![Most hackers for hire are scammers, research shows](/static/build/img/news/alt/data-breach-stats-small.jpg)
Google & UC-San Diego researchers found that only 5 of 27 hacker-for-hire services actually launched attacks against their targets.
![Facebook to Fund Research on Social Media Impact on Elections](/static/build/img/news/alt/Data-Cybersecurity-Predictions-2-small.jpg)
Facebook announced Monday its first research grants to academics studying the impact of social media on elections, part of an effort to prevent manipulation of social platforms. read more
![Research on private key generation reveals theft of ETH funds from accounts with discoverable keys](/static/build/img/news/alt/breach-statistics-small.jpg)
Researchers at Independent Security Evaluators (ISE) have discovered 732 actively used private keys on the Ethereum blockchain. In their new study titled Ethercombing, ISE found that poorly...
![The Art and Science of Cybersecurity Research](/static/build/img/news/alt/cybersecurity-breach-statistics-small.jpg)
Wade Baker and Jared Ettinger on How to Separate Pure Research from MarketingNew studies debut every day in the cybersecurity field. But how does one separate true research from marketing hype?...
![Friday Squid Blogging: New Research on Squid Camouflage](/static/build/img/news/alt/cloud-cybersecurity-statistics-small.jpg)
From the New York Times: Now, a paper published last week in Nature Communications suggests that their chromatophores, previously thought to be mainly pockets of pigment embedded in their skin,...
![Nozomi Networks shares research and tools to help ICS community defend against cyber threats](/static/build/img/news/alt/cyberattack-statistics-1-small.jpg)
Nozomi Networks, the leader in industrial cyber security and operational visibility announced the launch of Nozomi Networks Labs. Focused on helping defend the industrial systems that support...