• 4G LTE networks vulnerability allows adversaries to send fake emergency alerts

    Researchers have identified several new vulnerabilities in 4G LTE networks, potentially allowing hackers to forge the location of a mobile device and fabricate messages. The vulnerabilities would allow adversaries to send fake emergency paging messages to a large number of devices, drain a victim device’s battery by forcing it to perform expensive cryptographic operations, disconnect a device from the core network, and more.

  • Diminutive robot defends factories against cyberthreats

    It’s small enough to fit inside a shoebox, yet this robot on four wheels — called HoneyBot — has a big mission: keeping factories and other large facilities safe from hackers. The diminutive device is designed to lure in digital troublemakers who have set their sights on industrial facilities. HoneyBot will then trick the bad actors into giving up valuable information to cybersecurity professionals.

  • Propagating online conspiracies

    Due to the Internet, conspiracy theories are on the rise and playing an increasingly significant role in global politics. Now new research has analyzed digital data to reveal exactly who is propagating them and why. The researchers said that conspiracies such as Pizzagate (which falsely claimed high-ranking Democratic Party officials were running a child-sex ring out of a pizza shop) and the anti-vaccination movement are becoming a bigger issue.

  • Why you stink at fact-checking

    By Lisa Fazio

    People are very bad at picking up on factual errors in the world around them. Research from cognitive psychology shows that people are naturally poor fact-checkers and it is very difficult for us to compare things we read or hear to what we already know about a topic. In what’s been called an era of “fake news,” this reality has important implications for how people consume journalism, social media and other public information.

  • Russian ships scouting key communication cables

    Russia has not only attacked the infrastructure of American democracy, but has also engaged in what the U.S. government describes as a pervasive, wide-ranging cyber-assault on U.S. energy grid and other key components of the U.S. critical infrastructure. These attacks included leaving “sleeper” malware in key infrastructure nodes, which would allow Russia – remotely, and at the time of its choosing — to turn off power stations, open dam gates, shutdown water treatment facilities, and more. Western intelligence services have spotted Russian ships lurking around critical underwater communications cables, causing concern the Kremlin is doing reconnaissance in preparation for possible future retaliatory action.

  • Georgia passes anti-cyber whistleblower bill

    Despite the vigorous objections of the cybersecurity community, the Georgia legislature has passed a bill which would open independent researchers who identify vulnerabilities in computer systems to prosecution and up to a year in jail. Critics of the bill say that Georgia has positioned itself as a hub for cybersecurity research, but the bill would make cybersecurity firms think twice about relocating to Georgia.

  • Czechs extradite alleged Russian hacker Nikulin to U.S.

    The Czech Justice Ministry has announced that an alleged Russian hacker wanted by both Washington and Moscow has been extradited to the United States. Yevgeny Nikulin is accused of hacking big Internet companies including LinkedIn and Dropbox in 2012 and 2013. The FBI links him to the hacking of the Democratic Party’s servers during the 2016 U.S. presidential election campaign.

  • U.K.'s best cyber defenders compete for chance to take on the U.S. cyber best

    Inter-ACE, now in its third year, was established to help resolve the vast and growing cyber security skills gap, with an estimated shortfall of 1.8 million workers worldwide by 2022. More than 130 students representing eighteen of the U.K.’s top cybersecurity universities battled it out at the Inter-ACE 2018 cybersecurity challenge, hosted by the University of Cambridge. The competition, supported by GCHQ’s National Cyber Security Center, and designed to attract the next generation of cybersecurity talent.

  • Busting Russia’s fake news the European Union way

    By Thomas Holt

    The U.S. has been rocked over the last two years by claims that the Russian government directly attempted to meddle in the 2016 presidential election. Such efforts may be relatively new in the U.S. But they are part of a much larger global push by the Kremlin to affect politics across the European Union and exploit citizens through the internet. I study computer hacking, malware and the role of the internet in fraud and deception by various actors. And I believe that the Europeans have something to teach the United States about how to protect citizens subject to Russian internet propaganda.

  • Modeling cyber insurance could protect the power grid

    The failure of even parts of the U.S. power grid could cause rolling blackouts that paralyze health care, traffic and business systems. With the advent of “smart” infrastructures that send data to the internet, cybersecurity is becoming a prime concern of public officials. Researchers are aiming to help utility companies prepare for that risk by making it easier for insurance companies to cover it.

  • Privacy of Americans not protected in omnibus spending bill

    The CLOUD Act, inserted at the very end of the 2,232-page omnibus spending bill, will make substantial amendments to the Electronic Communications Privacy Act (ECPA). It grants U.S. law enforcement entities new powers to compel U.S. companies to disclose communications and data on U.S. and foreign users that is stored overseas. It also empowers foreign governments to demand the stored and real-time data and communications of users outside the U.S.

  • Cybersecurity Lab welcomes first female hacker-in-residence

    NYU Tandon’s Offensive Security, Incident Response and Internet Security Laboratory, aka the OSIRIS Lab, recently welcomed a new hacker-in-residence: Sophia d’Antoine, a Senior Security Researcher at Trail of Bits. As a hacker-in-residence at the student-run cybersecurity research lab, d’Antoine will be imparting her own expertise to the student members hoping to learn practical approaches to combating hackers who exploit real systems.

  • Why junk news spreads so quickly across social media

    By Samantha Bradshaw and Phillip N. Howard

    Why and how has the rise of social media contributed to the spread of what we at the Oxford University’s Computational Propaganda Project call “junk news” — the tabloidization, false content, conspiracy theories, political propaganda we have become all too familiar with? Three reasons: Algorithms, advertising. and exposure in public life.

  • Leaky apps exacerbate Facebook’s privacy risks

    A bug in Facebook’s advertising platform made it possible for potential hackers to uncover users’ phone numbers, according to new research. The Facebook advertising system is incredibly effective at targeting specific audiences, which is what has made the company so lucrative, says a researcher. But because anyone can become an advertiser, and there is very little transparency in what ads are being placed, the platform “could be used for nefarious purposes,” he added.

  • Cambridge Analytica: the data analytics industry is already in full swing

    By David Beer

    Revelations about Cambridge Analytica have laid bare the seeming lack of control that we have over our own data. Suddenly, with all the talk of “psychographics” and voter manipulation, the power of data analytics has become the source of some concern. But the risk is that if we look at the case of Cambridge Analytica in isolation, we might prevent a much wider debate about the use and control of our data. By focusing on the reports of extreme practices, we might miss the many everyday ways that data analytics are now shaping our lives.