Skip to content
GCC AI Research

Search

Results for "Phishing"

Hackers and the Internet of Things

KAUST ·

Cybersecurity specialist James Lyne spoke at KAUST's 2018 Winter Enrichment Program (WEP) about cybersecurity threats and techniques. Lyne demonstrated hacking and phishing attacks, emphasizing how hackers can exploit personal information by bypassing basic security measures. He highlighted the increasing sophistication of cybercriminals and the existence of illicit marketplaces on the dark web where hacking applications are sold. Why it matters: Raising awareness of cybersecurity threats is crucial for protecting individuals and organizations in Saudi Arabia and the broader region as digital infrastructure expands.

Opossum Attack

TII ·

Researchers at TII, in cooperation with University Paderborn and Ruhr University Bochum, have discovered a vulnerability called the Opossum Attack in Transport Layer Security (TLS) impacting protocols like HTTP(S), FTP(S), POP3(S), and SMTP(S). The vulnerability exposes a risk of desynchronization between client and server communications, potentially leading to exploits like session fixation and content confusion. Scans revealed over 2.9 million potentially affected servers, including over 1.4 million IMAP servers and 1.1 million POP3 servers. Why it matters: This discovery highlights the importance of ongoing cybersecurity research in the UAE and internationally to identify and address vulnerabilities in fundamental internet protocols, especially as it led to immediate action by Apache and Cyrus IMAPd.

Hunting for Spammers: Detecting Evolved Spammers on Twitter

arXiv ·

A study analyzes spam content on trending hashtags on Saudi Twitter, finding that approximately 75% of the total generated content is spam. The paper assesses the performance of previous spam detection systems on a newly gathered dataset and proposes an updated manual classification algorithm to improve accuracy. Adapted features are used to build a new data-driven detection system to respond to spammers' evolving techniques. Why it matters: The high prevalence of spam in Arabic content on Twitter necessitates the development of adaptive detection techniques to maintain the quality and trustworthiness of online information in the region.

On a mission to end fake news

MBZUAI ·

MBZUAI Professor Preslav Nakov is researching methods to combat fake news and online disinformation through NLP techniques. His work focuses on detecting harmful memes and identifying the stance of individuals regarding disinformation. Four of Nakov’s recent papers on these topics were presented at NAACL 2022. Why it matters: This research aims to mitigate the impact of weaponized news and online manipulation, contributing to a more trustworthy information environment in the region and globally.

Formal Methods for Modern Payment Protocols

MBZUAI ·

Researchers at ETH Zurich have formalized models of the EMV payment protocol using the Tamarin model checker. They discovered flaws allowing attackers to bypass PIN requirements for high-value purchases on EMV cards like Mastercard and Visa. The team also collaborated with an EMV consortium member to verify the improved EMV Kernel C-8 protocol. Why it matters: This research highlights the importance of formal methods in identifying critical vulnerabilities in widely used payment systems, potentially impacting financial security for consumers in the GCC region and worldwide.