Category: Blog

  • Use Retraction Watch to Keep Tabs on Bogus “Hijacked” Journals

    As a research institution, we know the value of credible, peer- reviewed journals. To cite and be cited is the lifeblood of modern academic discourse. But how do you know if a journal is what it purports to be? As reported recently in Nature, the project Retraction Watch, can allow researchers to find out before they submit if a…

  • A New Approach to Defeating Audio Capture Transcription

    In a previous message, we discussed the revelation that various videoconferencing apps were continuing to collect audio data even when microphones were muted, against the expectations of most users.   Taking concerns further, if you wish to guard against an unknown microphone surreptitiously listening in on your conversations, what can be done to make sure the recorded…

  • Muting in Virtual Meetings May Not Guarantee Privacy

    It is not unreasonable to assume that when you mute yourself in a virtual meeting, your microphone will no longer be accessed by the meeting application. However, a new study from the University of Wisconsin-Madison has found that in all cases, videoconferencing apps do not give up access to the microphone and collect some data.…

  • Apache HTTP Server Critical Vulnerability under Active Exploitation

    There are reports of active attacks on Apache servers. Apache HTTP Server 2.4.48 and earlier are vulnerable to a server-side request forgery (SSRF) flaw, allowing attackers to send crafted requests via a vulnerable server (turning it into a proxy) to target internal resources behind firewalls or arbitrary external systems.  The CVSS (Common Vulnerability Scoring System) score for this…