New algorithm identifies fake users on social networks

Illustration by NiroWorld/Shutterstock.com

Israeli and American researchers develop generic method to detect fake accounts on most types of social networks, including Facebook and Twitter. Fraudulent user profiles – bots – are a serious and growing concern on social media. By some estimates, as many as 48 million Twitter accounts and 270 million Facebook accounts are phony, designed for […]

Cyber @ BGU Mentioned

As with people, nations are best judged by what they do, not what they say. Based on the quality and quantity of its achievements, Israel clearly is a doer. For the third year in a row, in honor of Israel’s birthday, I’ve prepared a list of notable things the country has done over the past 12 […]

MOSQUITO Attack Allows Air-Gapped Computers to Covertly Exchange Data

The team of security researchers—who last month demonstrated how attackers could steal data from air-gapped computers protected inside a Faraday cage—are back with its new research showing how two (or more) air-gapped PCs placed in the same room can covertly exchange data via ultrasonic waves. Air-gapped computers are believed to be the most secure setup wherein the […]

Air gapping PCs won’t stop data sharing thanks to sneaky speakers

Boffins shows that sound output devices secretly capture audio Computer speakers and headphones make passable microphones and can be used to receive data via ultrasound and send signals back, making the practice of air gapping sensitive computer systems less secure. In an academic paper published on Friday through preprint service ArXiv, researchers from Israel’s Ben-Gurion […]

Police Issue Warning After Cameras At Women’s Apparel Shop Hacked

‘Assume every camera on a network can be hacked,’ cautioned the police cybercrimes unit. Aviral Peeping Tom who hacked into the closed-circuit TV surveillance camera at a women’s bathing suit shop has led to a warning from the Israel Police Cybercrimes Unit that similar systems may be compromised and violate the privacy of unsuspecting persons. […]

How dangerous are IOT devices? | Yuval Elovici | TEDxBGU

Prof. Elovici is Head of the Cyber Security Research Center at Ben Gurion University Think of your typical day: you wake up, do your morning routine, open the fridge, maybe turn on the heat, boiler for the shower? Get in the car and drive to work. We hear the term Internet of Things get thrown […]

New research: Most IoT devices can be hacked into botnets

A team of Israeli researchers have discovered that the average IoT devices you buy on store shelves can be compromised within 30 minutes and added to a botnet. As Internet of Things devices multiply exponentially, it looks like security still isn’t improving. A team of Ben-Gurion University researchers recently went out and bought a bunch […]

EEG-triggered dynamic difficulty adjustment for multiplayer games

Adi Stein, Yair Yotam, Rami Puzis, Guy Shani, Meirav Taieb-Maimon Entertainment Computing Volume 25, March 2018, Pages 14-25 Link to document In online games, gamers may become frustrated when playing against stronger players or get bored when playing against weaker players, thus losing interest in the game. Dynamic Difficulty Adjustment (DDA) has been suggested as […]

Taxonomy of mobile users’ security awareness

R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach, A Shabtai Computers & Security Volume 73, March 2018, Pages 266-293 Link to document The popularity of smartphones, coupled with the amount of valuable and private information they hold, make them attractive to attackers interested in exploiting the devices to harvest sensitive information. Exploiting human […]

Foundations of Homomorphic Secret Sharing

E. Boyle, N. Gilboa, Y. Ishai, R. Lin and S. Tessaro 9th Innovations in Theoretical Computer Science Conference (ITCS 2018) Link to document Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS scheme supports a local evaluation of functions on shares of one or more secret inputs, such that the […]

Skip to content