• CYERSECURITYUniversity Students Tackle Adventure in CyberForce — Conquer the Hill Competition

    University of Central Florida’s Cameron Whitehead wins CyberForce Conquer the Hill: Adventure Competition 2024. Whitehead was one of 112 students from 71 accredited U.S. colleges and universities who competed virtually to complete work-based cybersecurity tasks and challenges during a full day of energy sector-related adventure.

  • CHINA WATCHChinese Nationalist Groups Are Launching Cyber-Attacks – Often Against the Wishes of the Government

    By Lewis Eves

    China is often presented as a monolithic entity, entirely at the whim of the Chinese Communist Party (CCP). However, the reality is more complex. Many Chinese cyber-attacks and other kinds of digital interference are conducted by Chinese nationalist groups.

  • CYBERSECURITYThe Future of Cybersecurity

    By Stanford Engineering Staff

    An expert in cybersecurity surveys a rapidly evolving world where technology is racing ahead of our ability to manage it, posing risks to our national security. With TikTok in the hands of 170 million Americans, cybersecurity expert Amy Zegart says it’s time to talk about consequences. Foreign access to all that data on so many Americans is a national security threat, she asserts.

  • TRUTH DECAYCan Wikipedia-like Citations on YouTube Curb Misinformation?

    By Stefan Milne

    Videos can be dense with information: text, audio, and image after image. Yet each of these layers presents a potential source of error or deceit. And when people search for videos directly on a site like YouTube, sussing out which videos are credible sources can be tricky.

  • TRUTH DECAYUsers Seek Out Echo Chambers on Social Media

    Users are inclined to favor popular opinion; lack of exposure to dissent contributes to polarization.

  • CYBERSECURITY EDUCATIONCybersecurity Education Varies Widely in U.S.

    By Tina Hilding

    Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well trained to meet industry needs in a fast-changing field.

  • CHINA WATCHTruth and Reality with Chinese Characteristics

    The Chinese Communist Party seeks to maintain total control over the information environment within China, while simultaneously working to extend its influence abroad to reshape the global information ecosystem. That includes not only controlling media and communications platforms outside China, but also ensuring that Chinese technologies and companies become the foundational layer for the future of information and data exchange worldwide.

  • CYBERSECURITYKnocking Cloud Security Off Its Game

    By Daniel Meierhans

    Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.

  • IRAN’S THREATU.S. Sanctions on Iranian Hackers Highlight Growing Concern About the Islamic Republic’s Cyberwarriors

    By Vasileios Karagiannopoulos and Iain Reid

    A feature of the simmering tensions between the US, Israel and Iran has been not just the tit-for-tat missile and drone strikes and assassinations, but accusations of cyberwarfare waged by Iran.

  • CYBERSECURITYComputer Scientists Unveil Novel Attacks on Cybersecurity

    By Katie Ismael

    Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Intel and AMD issued security alerts based on the findings.

  • GRID SECURITYNew Cybersecurity Center to Protect Grids Integrated with Renewables, Microgrids

    Bringing renewable energy to the power grid raises all kinds of “internet-of-things” issues because “everything is connected,” says an expert. Solar inverters are connected to the internet. Wind farm controllers are connected to the internet. And with each internet connection, energy resources distributed across the countryside are potentially vulnerable to cyberattacks.

  • GRID SECURITYFirst Regional Cybersecurity Center to Protect the Nation’s Electricity Grid

    U.S. Department of Energy awards $10 million grant to develop innovative solutions to mitigating cyber threats across the U.S. A new center will bring together experts from the private sector, academia and government to share information and generate innovative real-world solutions to protect the nation’s power grid and other key sectors.

  • CYBERSECURITYCybersecurity Researchers Spotlight a New Ransomware Threat – Be Careful Where You Upload Files

    By Selcuk Uluagac

    Today’s web browsers are much more powerful than earlier generations of browsers. Unfortunately, these capabilities also mean that hackers can find clever ways to abuse the browsers to trick you into letting ransomware lock up your files when you think that you’re simply doing your usual tasks online.

  • TIKTOKBanning TikTok Won’t Solve Social Media’s Foreign Influence, Teen Harm and Data Privacy Problems

    By Sarah Florini

    Concerns about TikTok are not unfounded, but they are also not unique. Each threat posed by TikTok has also been posed by U.S.-based social media for over a decade. Lawmakers should take action to address harms caused by U.S. companies seeking profit as well as by foreign companies perpetrating espionage. Protecting Americans cannot be accomplished by banning a single app. To truly protect their constituents, lawmakers would need to enact broad, far-reaching regulation.

  • DATA SECURITYThis Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone

    By Adam Zewe

    Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.