• CybersecurityMega European project on cybersecurity and data protection

    A new European Commission cyber project aims to set international standards in cybersecurity and boost the effectiveness of Europe’s security capacities.

  • Truth decayRussian trolls, bots spread false vaccine information on Twitter

    A study found that Russian trolls and bots have been spreading false information about vaccination, in support of the anti-vaccination movement. The false information was generated by propaganda and disinformation specialists at the Kremlin-affiliated, St. Petersburg-based IRA. The Kremlin employed IRA to conduct a broad social media disinformation campaign to sow discord and deepen divisions in the United States, and help Donald Trump win the 2016 presidential election.

  • CyberforensicsCyber toolkit for criminal investigations

    cybercrimes reached a six-year high in 2017, when more than 300,000 people in the United States fell victim to such crimes. Losses topped $1.2 billion. Cybercriminals can run, but they cannot hide from their digital fingerprints.

  • CybersecurityDark web marketplace for SSL and TLS certificates

    A thriving marketplace for SSL and TLS certificates—small data files used to facilitate confidential communication between organizations’ servers and their clients’ computers—exists on a hidden part of the internet.

  • Extremism onlineStudying how hate and extremism spread on social media

    The ADL and the Network Contagion Research Institute will partner to produce a series of reports that take an in-depth look into how extremism and hate spread on social media – and provide recommendations on how to combat both.

  • Extremism onlineFour ways social media platforms could stop the spread of hateful content in aftermath of terror attacks

    By Bertie Vidgen

    Monitoring hateful content is always difficult and even the most advanced systems accidentally miss some. But during terrorist attacks the big platforms face particularly significant challenges. As research has shown, terrorist attacks precipitate huge spikes in online hate, overrunning platforms’ reporting systems. Lots of the people who upload and share this content also know how to deceive the platforms and get round their existing checks. So what can platforms do to take down extremist and hateful content immediately after terrorist attacks? I propose four special measures which are needed to specifically target the short term influx of hate.

  • CybersecurityBlocking digital gold diggers

    It is a phenomenon known to almost all of us: you browse the web and suddenly your computer slows down and runs loudly. This could be due to so-called crypto mining, meaning the access to computer power to generate cryptocurrencies without the knowledge of the user. New software, called “CoinEater,” blocks crypto mining.

  • The Russia connectionAnother Steel Dossier detail appears true

    On the final page of his 35-page dossier, former British intelligence officer Christopher Steele refers to a company, whose name is redacted, that allegedly was used to hack the Democratic party. Today, the New York Times identifies the company and its owner, Aleksej Gubarev, and says that according to a newly revealed report, the allegations against the Russian technology entrepreneur’s operations check out.

  • The Russia connectionRussia attempted 2018 interference, gearing up to infiltrate election systems in 2020

    Defense Department and Homeland Security officials warn Russia did try to interfere in the 2018 election, and the United States is not prepared for what foreign adversaries likely will launch in 2020. One official told lawmakers on the House Appropriations Homeland Security Subcommittee that “what keeps him up at night” is thinking about the new ways adversaries will attempt to infiltrate US election systems in 2020.

  • Election securityTrapdoor found in SwissVote election system

    Researchers have examined the source code published as part of the SwissPost e-voting system, provided by Scytl, and discovered a cryptographic trapdoor. If exploited, researchers say this could allow insiders who ran or implemented the election system to modify votes undetected.

  • Fake newsFraudulent news, disinformation become “new normal” political tactics

    New report warns of the risk of fraudulent news and online disinformation becoming a normalized part of U.S. political discourse. The report sounds an alarm that fraudulent news and online disinformation, which distort public discourse, erode faith in journalism, and skew voting decisions, are becoming part of the toolbox of hotly contested modern campaigns. 

  • Fake newsInformation literacy must be improved to stop spread of “fake news”

    It is not difficult to verify whether a new piece of information is accurate; however, most people do not take that step before sharing it on social media, regardless of age, social class or gender, a new study has found.

  • CybersecurityA new world for hackers: Acoustic side-channel attack

    During the DNA synthesis process in a laboratory, recordings can be made of the subtle, telltale noises made by synthesis machines. And those captured sounds can be used to reverse-engineer valuable, custom-designed genetic materials used in pharmaceuticals, agriculture and other bioengineering fields.

  • The Russia connectionDeterrence in the cyber age: U.K. Foreign Secretary's speech

    U.K. foreign secretary Jeremy Hunt last Thursday spoke at Glasgow University on cybersecurity and the U.K. government’s approach to deterring cybercrime. “In the cyber age, an authoritarian regime armed with nothing more ambitious than a laptop computer could try to manipulate our democracy, Hunt said. “For every example of publicly attributed interference [by Russia], there have been others that never saw the light of day.” He added: “The material fact is that the Russian state has tried to subvert democracy,” concluding: “We can no longer afford to wait until an authoritarian regime demonstrably succeeds in changing the outcome of an election and weakening trust in the integrity of democracy itself. The risk is that after just a few cases, a pall of suspicion would descend over a democratic process – and once that happens, the damage would be difficult, perhaps impossible, to repair.”

  • CyberwarfareU.S. military steps up cyberwarfare effort

    By Benjamin Jensen and Brandon Valeriano

    The U.S. military has the capability, the willingness and, perhaps for the first time, the official permission to preemptively engage in active cyberwarfare against foreign targets. The first known action happened as the 2018 midterm elections approached: U.S. Cyber Command, the part of the military that oversees cyber operations, waged a covert campaign to deter Russian interference in the democratic process.