News

Phishing affects everyone, but certain groups are at a higher risk of being phished than others. Prior research has pointed to language skills impacting phishing detection. We conducted a survey with ...
Red team exercises evaluate an organization’s security by simulating attacks based on real-world adversary techniques. Red team exercises typically involve three stakeholders: the red team that ...
Deepfake fraud—the use of AI-generated media to fabricate events for malicious purposes—threatens digital security, relationships, and public trust. This paper investigates individuals’ experiences ...
Governments have enacted age assurance regulations to prevent minors from accessing age-restricted content online, potentially creating barriers for adult users. This preliminary study empirically ...
Upcoming USENIX conferences, as well as events that are being held in cooperation with USENIX, are listed below. View USENIX's conference policies and resources and how we put them into practice at ...
Fraudsters often use the promise of free goods as a lure for victims who are convinced to complete online tasks but ultimately receive nothing. Despite much work characterizing these "giveaway scams," ...
Driving a car is an important part of daily life for most people in the United States. However, people have a limited understanding of the privacy risks associated with data collected in an automotive ...
Large language models (LLMs) are rapidly being integrated across industries. Early research shows that these models have the potential to provide support in cybersecurity tasks like malware detection, ...
The computing world increasingly focuses on data collection, and the integration of advanced IT technologies creates new privacy and security vulnerabilities. Traditional approaches to security and ...
As online education continues to grow, students increasingly navigate digital platforms that collect and share large amounts of data about them with almost no privacy protections or consent. Learning ...
Users’ perceptions of fitness tracking privacy is a subject of active study, but how do various aspects of social identity inform these perceptions? We conducted an online survey (N=322) that explores ...