UCLA Student
Infosec Blog

Cell Phone

By Telstra IN:SIGHT.com 

The security of personal information submitted online is a hot-button issue. We investigate how generation Y approaches privacy.

Millennials are a driving force in today’s digital marketplace. They’re shopping online while scrolling through their emails for deals and discounts. They like and share products across all social media channels. And they’re filling out forms and submitting orders at the tap of a fingertip or click of a mouse, entrusting their contact and payment information to just about any company.


Woman looking at departure board at airport

By Catharine Hamm | latimes.com | 03 December, 2018 
You may find an evil twin out there — not your own but one that still can do great harm. That nasty double often awaits you at your airport, ready to attack when you least expect it. That’s just one of the findings in a report that assesses the vulnerability of airport Wi-Fi, done not to bust the airports’ chops, but to make airports and travelers aware of the problems they could encounter.

Of the 45 airports reviewed, the report by Coronet said, two we might use could pose a special risk: San Diego and Orange County’s John Wayne, which rated No. 1 and No. 2, respectively, on the “Top 10 Most Vulnerable Airports.” 



Shopping bags

By Proofpoint Staff | proofpoint.com

As with most major events and trends, threat actors capitalize on Western holidays to craft lures and scams to trick users into clicking, installing malware, transferring funds, and otherwise acting on behalf of cybercriminals. Whether receiving email fraud messages asking users to purchase fake gift cards or using credit cards at terminals compromised with malware, the holidays present a variety of threats for businesses and consumers alike.

In particular, Proofpoint researchers have observed upticks in business email compromise (BEC) scams related to gift cards, holiday-themed lures in malicious emails, “Black Friday” shopping lures, and fluctuations in point-of-sale malware traffic.



By Violet Blue | PCWorld.com

Common as dirt, recording every move you make.

The American television series Mr. Robot introduces its viewers to a lot of hacking attacks, techniques, and tools. Most of it is based on actual methods and hardware, even if it is presented as far easier to do on the show than in real life. One thing the show portrays as a common, almost pedestrian attack technique is keylogging.

You need to know about keylogging, because it really is as common, easy to do, and critical to the success of criminals as it is on the TV show. That’s because the targets of attacks that involve keylogging are, well, just about anyone and everyone. And you wouldn’t even know that it’s happening.


Facial Recognition

By Byron V. Acohido | threatpost.com

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. Somewhat quietly over the past couple of years there has been a flurry of breakthroughs in biometric technology, led by some leapfrog advances in facial recognition systems. Now facial recognition appears to be on the verge of blossoming commercially, with security use-cases paving the way. Last week, SureID, a fingerprint services vendor based in Portland, Ore., announced a partnership with Robbie. AI, a Boston-based developer of a facial recognition system designed to be widely deployed on low-end cameras.


Nine people looking at their phones

By Gillian Cleary | Senior Software Engineer | Symantec
Just how much personal information are your apps gathering? And do they really need so much?

The average smartphone user these days has between 60 and 90 apps on their device. Most of these apps request some sort of information about you and the device you are using. They may want to know your name, your email address, or your real-world address. But because smartphones are so powerful, they can also get quite a bit more than that, such as your exact location. Some apps will even request access to the device’s camera or microphone.




By Gennie Gebhart | SecurityEducationCampaign.org
Keeping up with Facebook privacy scandals is basically a full-time job these days. Two weeks ago, it announced a massive breach with scant details. Then, this past Friday, Facebook released more information, revising earlier estimates about the number of affected users and outlining exactly what types of user data were accessed. Here are the key details you need to know, as well as recommendations about what to do if your account was affected.



There are millions of rewarding jobs in cybersecurity

By Russell Schrader, Executive Director, NCSA | StaySafeOnline

Cybersecuirty professionals touch the lives of each and every one of us—they play a critical role on the front lines of protecting our nation’s economy, from securing our financial information to making sire our quality of life is not jeopardized. Yet the nation faces a looming cybersecurity workforse crises – by 2021, an estimated 3. Million cybersecurity jobs will go unfilled.


Walk the Walk - Be CyberSafe!

October is National Cybersecurity Awareness Month (NCSAM) and 2018 marks NCSAM’s 15th year!  Once again, UCLA is a Cyber Champion among higher educational institutions nationwide that are participating in NCSAM campaigns to raise cyber awareness within their campus communities and to encourage everyone to protect their computers, mobile devices, networks, data, and private information.



Same Passwords? I too like to live dangerously

10 min | Tory Singer | Easy Read

Passwords are the gate keepers to our online accounts and identities. The keys to our data. And man, are there a lot of them! They aren’t too different from the physical keys we use to get into our house and our car. Except there are a lot of passwords. Like, a lot, a lot. About 23 on average per person to be exact, according to McAfee’s World Survey. Imagine having 23 physical keys. Sure, I know what you’re probably thinking: “Having 23 keys would be dope. I’d have a key for my Lambo, my beach house, my...”. But seriously how would we keep track of all of those keys and where they go?