UCLA Student
Infosec Blog

Facial Recognition

By Byron V. Acohido | threatpost.com

Tech advances are accelerating the use of facial recognition as a reliable and ubiquitous mass surveillance tool, privacy advocates warn. Somewhat quietly over the past couple of years there has been a flurry of breakthroughs in biometric technology, led by some leapfrog advances in facial recognition systems. Now facial recognition appears to be on the verge of blossoming commercially, with security use-cases paving the way. Last week, SureID, a fingerprint services vendor based in Portland, Ore., announced a partnership with Robbie. AI, a Boston-based developer of a facial recognition system designed to be widely deployed on low-end cameras.

Read more...

Nine people looking at their phones

By Gillian Cleary | Senior Software Engineer | Symantec
 
Just how much personal information are your apps gathering? And do they really need so much?

The average smartphone user these days has between 60 and 90 apps on their device. Most of these apps request some sort of information about you and the device you are using. They may want to know your name, your email address, or your real-world address. But because smartphones are so powerful, they can also get quite a bit more than that, such as your exact location. Some apps will even request access to the device’s camera or microphone.

Read more...

 

Facebook

By Gennie Gebhart | SecurityEducationCampaign.org
 
Keeping up with Facebook privacy scandals is basically a full-time job these days. Two weeks ago, it announced a massive breach with scant details. Then, this past Friday, Facebook released more information, revising earlier estimates about the number of affected users and outlining exactly what types of user data were accessed. Here are the key details you need to know, as well as recommendations about what to do if your account was affected.

Read more...

 

There are millions of rewarding jobs in cybersecurity

By Russell Schrader, Executive Director, NCSA | StaySafeOnline

Cybersecuirty professionals touch the lives of each and every one of us—they play a critical role on the front lines of protecting our nation’s economy, from securing our financial information to making sire our quality of life is not jeopardized. Yet the nation faces a looming cybersecurity workforse crises – by 2021, an estimated 3. Million cybersecurity jobs will go unfilled.

Read more...

Walk the Walk - Be CyberSafe!

October is National Cybersecurity Awareness Month (NCSAM) and 2018 marks NCSAM’s 15th year!  Once again, UCLA is a Cyber Champion among higher educational institutions nationwide that are participating in NCSAM campaigns to raise cyber awareness within their campus communities and to encourage everyone to protect their computers, mobile devices, networks, data, and private information.

Read more...

 

Same Passwords? I too like to live dangerously

10 min | Tory Singer | Easy Read

Passwords are the gate keepers to our online accounts and identities. The keys to our data. And man, are there a lot of them! They aren’t too different from the physical keys we use to get into our house and our car. Except there are a lot of passwords. Like, a lot, a lot. About 23 on average per person to be exact, according to McAfee’s World Survey. Imagine having 23 physical keys. Sure, I know what you’re probably thinking: “Having 23 keys would be dope. I’d have a key for my Lambo, my beach house, my...”. But seriously how would we keep track of all of those keys and where they go?

Read more...

Ninjio Season 3: Episode 9 - Wi-Fi security and small hacking devices

In this episode, a submarine commander faces a potentially deadly attack.  It seems that an enemy obtained confidential data about the submarine’s sensors; the contractor responsible needs to track down what happened and make some changes, fast.  Watch and learn how small, portable, and inexpensive devices might be used to gain access to your data.

Watch here!

Cap and Profit

By Karl Vogel Worldwide Solutions Architect, Symantec | Fraud.org

Don’t wait for attackers to take initiative. Here’s how proactive threat hunting can significantly improve your security posture.

Read more...

Amazon Locker

By Geoff Williams, Contributor | US News &World Report

Stay on the lookout and sidestep crooks by protecting your personal and financial information and staying vigilant of these common Amazon-related scams.

Read more...

 

Digital World

By Lee Mathews Contributor Security | Forbes

Earlier this year several media outlets reported that Facebook sneakily encouraged users to download a VPN called Onavo for security reasons. VPNs redirect a user’s internet traffic through a third-party server which blocks everyone including the user’s ISP from seeing what the user is doing online. What Facebook didn’t make very clear was they that own Onavo, the third-party servers are Facebook’s, and the company uses the data feed to track the apps people are using. In other words, Onavo is basically a Facebook spyware program.

Read more...