

{"id":1561,"date":"2020-09-21T10:20:19","date_gmt":"2020-09-21T14:20:19","guid":{"rendered":"https:\/\/sites.temple.edu\/care\/?page_id=1561"},"modified":"2026-02-02T21:35:38","modified_gmt":"2026-02-03T02:35:38","slug":"in-the-media","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/care\/in-the-media\/","title":{"rendered":"In the Media"},"content":{"rendered":"<p>The CARE Lab members and\/or their work have been recognized in the media outlets below:<\/p>\n<p><a href=\"https:\/\/soundcloud.com\/onwurd\/dr-aunshul-rege-tech-life-steph-2126?in=onwurd\/sets\/life-tech-with-tech-life-steph&amp;utm_source=clipboard&amp;utm_medium=text&amp;utm_campaign=social_sharing\" target=\"_blank\" rel=\"noopener\">WURD Radio&#8217;s Life &amp; Tech w\/ Tech Life Steph. &#8220;Online Scams&#8221; &#8211; February 1, 2026 (20 minute mark)<\/a><\/p>\n<p><a href=\"https:\/\/technical.ly\/civics\/penn-email-breach-lawsuits-hackers\/\" target=\"_blank\" rel=\"noopener\">Technical.ly, &#8220;Everything we know about the Penn email breach \u2014 and how to protect yourself from further damage&#8221; &#8211; November 6, 2025<\/a><\/p>\n<p><a href=\"https:\/\/redefiningcybersecuritypodcast.com\/episodes\/why-cybersecurity-training-isnt-working-and-what-to-do-instead-human-centered-cybersecurity-series-with-co-host-julie-haney-and-guest-dr-aunshul-rege-redefining-cybersecurity-with-sean-martin\" target=\"_blank\" rel=\"noopener\">Redefining Cybersecurity Podcast. &#8220;Why Cybersecurity Training Isn\u2019t Working \u2014 And What To Do Instead&#8221; &#8211; September 25, 2025<\/a><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/universitys-critical-infrastructure-ransomware-attack-tracker-reaches-2000-incidents\/\" target=\"_blank\" rel=\"noopener\">Security Week. &#8220;Critical Infrastructure Ransomware Attack Tracker Reaches 2,000 Incidents&#8221; &#8211; January 7, 2025<\/a><\/p>\n<p><a href=\"https:\/\/www.wideopencountry.com\/scammer-pretending-to-be-keanu-reeves-cons-woman-out-of-life-savings\/\" target=\"_blank\" rel=\"noopener\">Wide Open Country. &#8220;Scammer Pretending To Be Keanu Reeves Cons Woman Out Of Life Savings&#8221; &#8211; December 28, 2024<\/a><\/p>\n<p><a href=\"https:\/\/www.nbclosangeles.com\/news\/national-international\/vista-woman-keanu-reeves-imposter-romance-scam\/3588750\/\" target=\"_blank\" rel=\"noopener\">NBC Los Angeles. &#8220;California woman loses life savings in \u2018Keanu Reeves&#8217; imposter romance scam&#8221; &#8211; December 23, 2024<\/a><\/p>\n<p><a href=\"https:\/\/temple-news.com\/north-philly-residents-learn-digital-safety-skills\/\" target=\"_blank\" rel=\"noopener\">The Temple News. &#8220;North Philly residents learn digital safety skills&#8221; &#8211; November 19, 2024<\/a><\/p>\n<p><a href=\"https:\/\/news.temple.edu\/news\/2024-11-04\/temple-conducts-free-cybersecurity-training-underserved-communities-develops-college\" target=\"_blank\" rel=\"noopener\">Temple Now. &#8220;Temple conducts free cybersecurity training to underserved communities, develops college students\u2019 career skills&#8221; &#8211; November 4, 2024<\/a><\/p>\n<p><a href=\"https:\/\/creators.spotify.com\/pod\/show\/teaching-together\/episodes\/Lessons-in-Social-Engineering--Part-2-e2pelr1\" target=\"_blank\" rel=\"noopener\">Temple CAT Podcast. &#8220;Lessons in Social Engineering Parts 2&#8221; &#8211; October 14, 2024<\/a><\/p>\n<p><a href=\"https:\/\/creators.spotify.com\/pod\/show\/teaching-together\/episodes\/Lessons-in-Social-Engineering--Part-1-e2peknb\" target=\"_blank\" rel=\"noopener\">Temple CAT Podcast. &#8220;Lessons in Social Engineering Parts 1&#8221; &#8211; October 14, 2024<\/a><\/p>\n<p><a href=\"https:\/\/restofworld.org\/2024\/tinder-colombia-medellin\/\" target=\"_blank\" rel=\"noopener\">Rest Of World. &#8220;After dating app murders spike in Colombia, Match Group offers to help the police&#8221; &#8211; March 5, 2024<\/a><\/p>\n<p><a href=\"https:\/\/english.jagran.com\/india\/jagran-josh-partners-with-philadelphias-temple-university-to-help-youth-successfully-tackle-cybercrime-10108251\" target=\"_blank\" rel=\"noopener\">Jagran New Media. Press Release on CARE Lab partnership for the &#8216;Being Cyberwise&#8217; Youth Awareness Campaign in India &#8211; October 19, 2023<\/a><\/p>\n<p><a href=\"https:\/\/whyy.org\/episodes\/online-dating-scam-catfishing-fraud-peanut-allergy\/\" target=\"_blank\" rel=\"noopener\">WHYY\/PBS\/NPR&#8217;s Studio 2. &#8220;Online Romance Scams, Peanut Allergy Patches, Hittin\u2019 Season Podcast&#8221; &#8211; May 24, 2023<\/a><\/p>\n<p><a href=\"https:\/\/www.bbc.com\/news\/world-64720239\" target=\"_blank\" rel=\"noopener\">BBC World Service. &#8220;The woman whose stolen images were used to scam men out of thousands&#8221; &#8211; February 25, 2023<\/a><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=wQE_AxVui8Y&amp;t=3s\" target=\"_blank\" rel=\"noopener\">BBC World Service. &#8220;Why do so many catfishing scams come out of West Africa?&#8221; &#8211; February 14, 2023<\/a><\/p>\n<p><a href=\"https:\/\/www.bbc.co.uk\/programmes\/w13xtvq7\" target=\"_blank\" rel=\"noopener\">BBC World Service and CBC Podcasts. &#8220;Love, Janessa&#8221;, Episode 2 &#8211; January 30, 2023<\/a>. Podcast lauded on <a href=\"https:\/\/www.esquire.com\/entertainment\/g42710922\/best-podcasts-2023\/\" target=\"_blank\" rel=\"noopener\">Esquire<\/a>, <a href=\"https:\/\/www.theguardian.com\/tv-and-radio\/2023\/jan\/26\/hear-here-love-janessa-podcast?CMP=share_btn_tw\" target=\"_blank\" rel=\"noopener\">The Guardian<\/a>, <a href=\"https:\/\/www.vulture.com\/article\/new-podcasts-what-to-listen-to.html\" target=\"_blank\" rel=\"noopener\">Vulture<\/a>, and <a href=\"https:\/\/www.ft.com\/content\/31724b54-bd04-4c03-b137-b5ff7e6a11b1\" target=\"_blank\" rel=\"noopener\">Financial Times<\/a>.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=wikyhVFPiDA\" target=\"_blank\" rel=\"noopener\">Hacking Networks: the David Bombal Show. &#8220;Hack People with Social Engineering&#8221; &#8211; August 26, 2022<\/a><\/p>\n<p><a href=\"https:\/\/technical.ly\/diversity-equity-inclusion\/philly-universities-stem-efforts\/\" target=\"_blank\" rel=\"noopener\">Technical.ly. &#8220;Tech is set to drive \u2018every aspect of society.\u2019 What are Philadelphia\u2019s universities doing to diversify their STEM talent pipelines?&#8221; &#8211; July 7, 2022<\/a><\/p>\n<p><a href=\"https:\/\/technical.ly\/civic-news\/reallist-connectors-2022-philly\/\" target=\"_blank\" rel=\"noopener\">Technical.ly. &#8220;RealLIST Connectors 2022: Get to know 22 leaders making Philly\u2019s tech and biz ecosystem stronger&#8221; &#8211; May 31, 2022<\/a><\/p>\n<p><a href=\"https:\/\/www.nbcphiladelphia.com\/investigators\/consumer\/celebrity-romance-scams-on-the-rise\/3252053\/\" target=\"_blank\" rel=\"noopener\">NBC 10 Philadelphia. &#8220;Celebrity Romance Scams on the Rise&#8221; &#8211; May 26, 2022<\/a><\/p>\n<p><a href=\"https:\/\/hackingbutlegal.com\/the-chutzpah-of-an-information-security-plagiarist-687f9ce89e86\" target=\"_blank\" rel=\"noopener\">Hacking But Legal. &#8220;The Chutzpah of an Information Security Plagiarist&#8221; &#8211; April 4, 2022<\/a><\/p>\n<p><a href=\"https:\/\/avnation.tv\/podcast\/it-factor-52-hacking-the-human\/\" target=\"_blank\" rel=\"noopener\">IT Factor Podcast. &#8220;Episode 52. Hacking the Human&#8221; &#8211; April 1, 2022<\/a><\/p>\n<p><a href=\"https:\/\/devpods.herokuapp.com\/podcasts\/devnews\/episodes\/249\" target=\"_blank\" rel=\"noopener\">DevNews Podcast. &#8220;Season 7, Episode 6: The Growth of Online Romance Scams, Facebook\u2019s Content Moderation &#8216;Sweatshop,\u2019 and More&#8221; &#8211; February 17, 2022<\/a><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/university-project-cataloged-1100-ransomware-attacks-critical-infrastructure\" target=\"_blank\" rel=\"noopener\">Security Week, &#8220;University Project Cataloged 1,100 Ransomware Attacks on Critical Infrastructure&#8221; &#8211; February 10, 2022<\/a><\/p>\n<p><a href=\"https:\/\/www.newswire.com\/news\/university-of-texas-at-arlington-takes-apwg-ecrime-symposium-top-paper-21568311?_ga=2.255063370.315569782.1639531092-3741122.1639531092\" target=\"_blank\" rel=\"noopener\">NewsWire. &#8220;University of Texas at Arlington Takes APWG eCrime Symposium Top Paper Award With Study of Twitter&#8217;s Growing Utility as a Potent Phishing Report Channel. <strong>Researchers from Temple<\/strong> and Princeton <strong>Win &#8216;Best Student Paper&#8217; Awards With Social-Engineering Capture the Flag Exercise<\/strong> and a Study of the Security and Privacy Risks of Phone Number Recycling&#8221; &#8211; December 14, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.gartner.com\/en\/documents\/4008351\/predicts-2022-cyber-physical-systems-security-critical-infrastructure-in-focus\" target=\"_blank\" rel=\"noopener\">Gartner, &#8220;Predicts 2022: Cyber-Physical Systems Security \u2014 Critical Infrastructure in Focus&#8221; &#8211; November 17, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.brinknews.com\/quick-take\/ransomware-attacks-on-critical-infrastructure-are-surging\/\" target=\"_blank\" rel=\"noopener\">BRINK, &#8220;Ransomware Attacks on Critical Infrastructure Are Surging&#8221; &#8211; September 12, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/95739--day-plan-what-european-nations-can-do-to-protect-utilities\" target=\"_blank\" rel=\"noopener\">Security Magazine, &#8220;100-day plan: What European nations can do to protect utilities&#8221; &#8211; July 30, 2021<\/a><\/p>\n<p><a href=\"https:\/\/californianewstimes.com\/pipeline-ransom-attack-exposes-risk-of-digitising-us-infrastructure\/350819\/\" target=\"_blank\" rel=\"noopener\">California News Times, &#8220;Pipeline ransom attack exposes risk of digitising US infrastructure&#8221; &#8211; May 21, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.ft.com\/content\/3a6941ce-8b0f-40b1-84d6-6418d8a84c94\" target=\"_blank\" rel=\"noopener\">Financial Times, &#8220;Hackers target US infrastructure after digitisation on the cheap&#8221; &#8211; May 21, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.businessinsider.com\/colonial-pipeline-hack-ransom-cryptocurrency-darkside-2021-5\" target=\"_blank\" rel=\"noopener\">Business Insider, &#8220;The hackers who shut down Colonial Pipeline brought in over $90 million in bitcoin ransoms while in operation&#8221; &#8211; May 19, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.dallasnews.com\/opinion\/commentary\/2021\/05\/19\/the-us-must-regulate-cybersecurity-for-critical-infrastructure-like-pipelines\/\" target=\"_blank\" rel=\"noopener\">The Dallas Morning News, &#8220;The U.S. must regulate cybersecurity for pipelines and other critical infrastructure&#8221; &#8211; May 15, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.usatoday.com\/story\/news\/2021\/05\/13\/colonial-pipeline-hack-latest-rising-threat-ransomware-attacks\/5071254001\/\" target=\"_blank\" rel=\"noopener\">USA Today, &#8220;&#8216;Life-or-death impacts&#8217;: Colonial hack the latest in rising threat of ransomware attacks&#8221; &#8211; May 13, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.ineteconomics.org\/perspectives\/blog\/hijacked-and-paying-the-price-why-ransomware-gangs-should-be-designated-as-terrorists\" target=\"_blank\" rel=\"noopener\">Institute for New Economic Thinking, &#8220;Hijacked and Paying the Price &#8211; Why Ransomware Gangs Should be Designated as Terrorists&#8221; &#8211; May 13, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.washingtonpost.com\/business\/2021\/05\/12\/ransomware-attack\/\" target=\"_blank\" rel=\"noopener\">The Washington Post, &#8220;Ransomware attacks could reach \u2018pandemic\u2019 proportions. What to know after the pipeline hack.&#8221; &#8211; May 12, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.ciodive.com\/news\/critical-infrastructure-attack-ransomware\/599977\/\" target=\"_blank\" rel=\"noopener\">CIO Dive, &#8220;Critical infrastructure flaws surface after years of underinvestment, inaction&#8221; &#8211; May 11, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-05-10\/how-a-key-u-s-pipeline-got-knocked-out-by-hackers-quicktake\" target=\"_blank\" rel=\"noopener\">Bloomberg, &#8220;How a Key U.S. Pipeline Got Knocked Out by Hackers&#8221; &#8211; May 10, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.esecurityplanet.com\/trends\/colonial-pipeline-ransomware-attack\/\" target=\"_blank\" rel=\"noopener\">eSecurity Planet, &#8220;Colonial Pipeline Ransomware Attack Shows Critical Infrastructure Vulnerabilities&#8221; &#8211; May 10, 2021<\/a><\/p>\n<p><a href=\"https:\/\/anchor.fm\/layer-8-podcast\/episodes\/Episode-57-Collegiate-Social-Engineering-Capture-the-Flag-Organizing-Team-ev6845\" target=\"_blank\" rel=\"noopener\">Layer8 Podcast. &#8220;Episode 57: Collegiate Social Engineering Capture the Flag Organizing Team&#8221; &#8211; May 3, 2021<\/a><\/p>\n<p><a href=\"https:\/\/technical.ly\/philly\/2021\/03\/10\/covid-vaccine-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">Technical.ly Philly, &#8220;While link-sharing issues are being handled in Philly, the COVID-19 vaccine rollout faces cybersecurity risks&#8221; &#8211; March 10, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.chicagotribune.com\/lifestyles\/ct-life-romance-scammers-inside-look-tt-02082021-20210209-v4dn7rqdeng27cs4hkdgnkjyyq-story.html\" target=\"_blank\" rel=\"noopener noreferrer\">Chicago Tribune, &#8220;My suitors are handsome, successful and ready for love. But are they real? My journey through the seamy world of romance scams.&#8221; &#8211; February 9, 2021<\/a><\/p>\n<p><a href=\"https:\/\/www.gartner.com\/en\/documents\/3992238\/facing-new-threats-cyber-physical-systems\" target=\"_blank\" rel=\"noopener\">Gartner, &#8220;Facing New Threats \u2014 Cyber-Physical Systems&#8221; &#8211; October 27, 2020<\/a><\/p>\n<p><a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/academia-adopts-mitre-attandck-framework\/d\/d-id\/1339197?\" target=\"_blank\" rel=\"noopener noreferrer\">Dark Reading, &#8220;Academia Adopts Mitre ATT&amp;CK Framework&#8221; &#8211; October 16, 2020<\/a><\/p>\n<p><a href=\"https:\/\/blog.trustedci.org\/2020\/10\/transition-to-practice-success-story.html\" target=\"_blank\" rel=\"noopener noreferrer\">Trusted CI, &#8220;Transition to practice success story: The behavioral side of cybersecurity&#8221; &#8211; October 15, 2020<\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-week-in-ransomware-september-18th-2020-schools-under-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bleeping Computer, The Week in Ransomware &#8211; &#8220;Schools under attack&#8221; &#8211; September 18, 2020<\/a><\/p>\n<p><a href=\"https:\/\/www.sentinelone.com\/blog\/how-ransomware-attacks-are-threatening-our-critical-infrastructure\/\" target=\"_blank\" rel=\"noopener\">SentinelOne, How Ransomware Attacks Are Threatening Our Critical Infrastructure &#8211; September 17, 2020<\/a><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/university-project-tracks-ransomware-attacks-critical-infrastructure\" target=\"_blank\" rel=\"noopener noreferrer\">Security Week, &#8220;University Project Tracks Ransomware Attacks on Critical Infrastructure&#8221; &#8211; September 12, 2020<\/a><\/p>\n<p><a href=\"https:\/\/www.aarp.org\/money\/scams-fraud\/info-2020\/online-romance-scams-experts.html\" target=\"_blank\" rel=\"noopener noreferrer\">AARP, &#8220;Criminals Collect Millions in Romance Scams&#8221; &#8211; February 10, 2020<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The CARE Lab members and\/or their work have been recognized in the media outlets below: WURD Radio&#8217;s Life &amp; Tech w\/ Tech Life Steph. &#8220;Online&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/care\/in-the-media\/\">Continue reading<span class=\"screen-reader-text\">In the Media<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-1561","page","type-page","status-publish","hentry","entry"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/comments?post=1561"}],"version-history":[{"count":18,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1561\/revisions"}],"predecessor-version":[{"id":4139,"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/pages\/1561\/revisions\/4139"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/care\/wp-json\/wp\/v2\/media?parent=1561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}