-
CYERSECURITYUniversity Students Tackle Adventure in CyberForce — Conquer the Hill Competition
University of Central Florida’s Cameron Whitehead wins CyberForce Conquer the Hill: Adventure Competition 2024. Whitehead was one of 112 students from 71 accredited U.S. colleges and universities who competed virtually to complete work-based cybersecurity tasks and challenges during a full day of energy sector-related adventure.
-
-
CHINA WATCHChinese Nationalist Groups Are Launching Cyber-Attacks – Often Against the Wishes of the Government
China is often presented as a monolithic entity, entirely at the whim of the Chinese Communist Party (CCP). However, the reality is more complex. Many Chinese cyber-attacks and other kinds of digital interference are conducted by Chinese nationalist groups.
-
-
CYBERSECURITYThe Future of Cybersecurity
An expert in cybersecurity surveys a rapidly evolving world where technology is racing ahead of our ability to manage it, posing risks to our national security. With TikTok in the hands of 170 million Americans, cybersecurity expert Amy Zegart says it’s time to talk about consequences. Foreign access to all that data on so many Americans is a national security threat, she asserts.
-
-
TRUTH DECAYCan Wikipedia-like Citations on YouTube Curb Misinformation?
Videos can be dense with information: text, audio, and image after image. Yet each of these layers presents a potential source of error or deceit. And when people search for videos directly on a site like YouTube, sussing out which videos are credible sources can be tricky.
-
-
TRUTH DECAYUsers Seek Out Echo Chambers on Social Media
Users are inclined to favor popular opinion; lack of exposure to dissent contributes to polarization.
-
-
CYBERSECURITY EDUCATIONCybersecurity Education Varies Widely in U.S.
Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well trained to meet industry needs in a fast-changing field.
-
-
CHINA WATCHTruth and Reality with Chinese Characteristics
The Chinese Communist Party seeks to maintain total control over the information environment within China, while simultaneously working to extend its influence abroad to reshape the global information ecosystem. That includes not only controlling media and communications platforms outside China, but also ensuring that Chinese technologies and companies become the foundational layer for the future of information and data exchange worldwide.
-
-
CYBERSECURITYKnocking Cloud Security Off Its Game
Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.
-
-
IRAN’S THREATU.S. Sanctions on Iranian Hackers Highlight Growing Concern About the Islamic Republic’s Cyberwarriors
A feature of the simmering tensions between the US, Israel and Iran has been not just the tit-for-tat missile and drone strikes and assassinations, but accusations of cyberwarfare waged by Iran.
-
-
CYBERSECURITYComputer Scientists Unveil Novel Attacks on Cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Intel and AMD issued security alerts based on the findings.
-
-
GRID SECURITYNew Cybersecurity Center to Protect Grids Integrated with Renewables, Microgrids
Bringing renewable energy to the power grid raises all kinds of “internet-of-things” issues because “everything is connected,” says an expert. Solar inverters are connected to the internet. Wind farm controllers are connected to the internet. And with each internet connection, energy resources distributed across the countryside are potentially vulnerable to cyberattacks.
-
-
GRID SECURITYFirst Regional Cybersecurity Center to Protect the Nation’s Electricity Grid
U.S. Department of Energy awards $10 million grant to develop innovative solutions to mitigating cyber threats across the U.S. A new center will bring together experts from the private sector, academia and government to share information and generate innovative real-world solutions to protect the nation’s power grid and other key sectors.
-
-
CYBERSECURITYCybersecurity Researchers Spotlight a New Ransomware Threat – Be Careful Where You Upload Files
Today’s web browsers are much more powerful than earlier generations of browsers. Unfortunately, these capabilities also mean that hackers can find clever ways to abuse the browsers to trick you into letting ransomware lock up your files when you think that you’re simply doing your usual tasks online.
-
-
TIKTOKBanning TikTok Won’t Solve Social Media’s Foreign Influence, Teen Harm and Data Privacy Problems
Concerns about TikTok are not unfounded, but they are also not unique. Each threat posed by TikTok has also been posed by U.S.-based social media for over a decade. Lawmakers should take action to address harms caused by U.S. companies seeking profit as well as by foreign companies perpetrating espionage. Protecting Americans cannot be accomplished by banning a single app. To truly protect their constituents, lawmakers would need to enact broad, far-reaching regulation.
-
-
DATA SECURITYThis Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
-
More headlines
The long view
ELECTION SECURITYStates Rush to Combat AI Threat to Elections
By Zachary Roth
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
RANSOMWARERansomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
By Dino Jahic
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
CHINA WATCHChinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
AUTONOMOUS VEHICLESAutonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
CYBERDETERRENCETantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.