• Biologically inspired network protection software

    Electrical engineers look to the human immune system for clues on how to best protect digital networks. It’s a concept that’s beginning to be explored more and more by researchers in a variety of fields: What does the human body do well and how can we adapt those mechanisms to improve technology or engineering systems?

  • Securing blockchain technology for cryptocurrency and other applications

    Cryptocurrency, or digital currency, was introduced in 2009 by Bitcoin, and the market has since expanded to include many other brands such as Ethereum, Ripple, Litecoin and Zcash. Because it is based on unique blockchain technology, a decentralized network that doesn’t require a third party to process transactions, cryptocurrency operates independently from the global banking system. The privacy that users of a network based on blockchain technology have, however, is a major drawback.

  • Hate incidents are underreported. Now, there’s an app for that

    Despite the FBI recording an all-time high in hate-motivated incidents in 2017 (the most recent year’s statistics available) the number is likely much higher. Low reporting from victims to police and inconsistent reporting from police to federal authorities have created a massive gap in how we understand hate in America. Researchers from the University of Utah want to fill that gap with an app.

  • Making scalable on-chip security pervasive

    For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. A new DARP program focuses on addressing the economic and technical challenges associated with incorporating scalable defense mechanisms into chip designs.

  • Making scalable on-chip security pervasive

    For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. A new DARP program focuses on addressing the economic and technical challenges associated with incorporating scalable defense mechanisms into chip designs.

  • Online voting not ready for prime time

    Online voting is often considered a way to improve voter turnout and security. But according to one expert, computer scientists have got a long way to go before they make it a viable alternative to pencils and paper.

  • AfD Bunestag member under Russian influence: Report

    Markus Frohnmaier, an MP for the far-right, populist AfD party, could be controlled by Russia, several European media outlets have reported. Frohnmaier has publicly sided with Moscow on practically each and every issue important to Vladimir Putin. The investigative report – the result of a joint effort by several leading European news organizations – concluded that Frohnmaier “stands under the influence of Moscow” and that his political and legislative actions aim to further Russia’s strategic interests.

  • Nagging security concerns over using Huawei’s tech in Europe

    New report urges NATO members to look to emulate Britain, which created an entire government office to scrutinize Huawei’s products for security problems.

  • Attacks against elections are inevitable – Estonia shows what can be done

    Kremlin-backed attackers are working to influence the upcoming European Parliament elections, according to cybersecurity firm FireEye. These new reports highlight rising fears of digital attacks on democracy around the world, including on the U.S. presidential elections in 2020. Russian interference in the West is not new. The experiences of Estonia – the first country ever victim to a clearly coordinated and politically motivated cyber operation – can inform American and European defenses to these complex threats.

  • Hackers can dupe radiologists, AI software

    Hackers can access a patient’s 3-D medical scans to add or remove malignant lung cancer, and deceive both radiologists and artificial intelligence algorithms used to aid diagnosis, according to a new study.

  • Supporting global companies against cyber threats

    A consortium of U.K. cyber security experts is to support global businesses to tackle online threats and protect themselves from cybercrime. The Cyber Readiness for Boards project has been launched to explore the factors shaping U.K. board decisions around cyber risk and develop interventions to provide guidance and support.

  • Bigger than Huawei: U.S. broadens scrutiny of Chinese technology

    A flurry of seemingly disconnected actions by the U.S. government to curb the involvement of Chinese technology firms in the U.S. economy over the past year reflects the Trump administration’s intensifying concern that those firms could — now or in the future — abet espionage by Beijing’s intelligence services.

  • AI automatically detects disturbances in power supply grids

    The grid is changing as the big, centralized providers of the past are replaced by smaller, distributed suppliers. Keeping such complex networks running stable requires high-resolution sensor technology – AI provides a way to make accurate predictions and automatically detect any disturbances or anomalies in real time.

  • April Fools hoax stories may offer clues to help identify “fake news”

    Studying April Fools hoax news stories could offer clues to spotting ‘fake news’ articles, new research reveals. Researchers interested in deception have compared the language used within written April Fools hoaxes and fake news stories.

  • In disasters, Twitter users with large networks get out-tweeted

    New study shows that when it comes to sharing emergency information during natural disasters, timing is everything. The study on Twitter use during hurricanes, floods and tornadoes offers potentially life-saving data about how information is disseminated in emergency situations, and by whom. Unlikely heroes often emerge in disasters, and the same is true on social media.