-
Is China’s Huawei a Threat to U.S. National Security?
The Chinese telecommunications company, a world leader in 5G technology and smartphones, faces accusations that the Chinese intelligence services can use – and have used — its 5G infrastructure for espionage. The U.S. and other Western countries have effectively banned Huawei from building their 5G networks, but it remains popular in low-income countries. The outcome of the struggle could shape the world’s tech landscape for years to come.
-
-
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
The algorithms are designed to protect data created and transmitted by the Internet of Things and other small electronics.
-
-
Foolproof: A Psychological Vaccine Against Fake News
Even an optimistic account of our ability to spot fake news has to come to grips with the fact that not everyone needs to be fooled in order for misinformation to be highly influential and dangerous. After all, major elections are often decided on small margins, and cyber propaganda is playing an increasingly important role in tearing down the fabric of our democracy.
-
-
Since Elon Musk’s Takeover, Twitter Has Seen a Rapid Rise in Gen-Z, Neo-Nazi Antisemitism: Study
A new study has demonstrated that extremist elements have viewed Elon Musk’s takeover of Twitter as an opportunity to rejoin the social media platform en masse. The study also indicates that a sea change is taking place on Twitter with respect to the proliferation of extremist antisemitic content.
-
-
Grant to Support High-Potential Computer Science Students
The University of Texas at El Paso received a $5 million grant from the National Science Foundation (NSF) to provide financial support and professional development experiences to talented students in the field of computer science.
-
-
U.S. Dismantles Ransomware Network Responsible for More Than $100 Million in Extortion
An international ransomware network that extorted more than $100 million from hundreds of victims around the world has been brought down following a monthslong infiltration by the FBI. The group known as Hive targeted more than 1,500 victims, including hospitals, school districts and financial firms in more than 80 countries.
-
-
How Chinese Companies Are Challenging National Security Decisions That Could Delay 5G Network Rollout
In many countries, governments have decided to block Chinese companies from participating in building communication infrastructure in their countries because of national security concerns. Chinese companies and investors often refuse to take such national security changes lying down. With varying degrees of success, firms have mounted a range of formal and informal challenges in recent years.
-
-
Cybersecurity Defense Software Put Through the Wringer at NATO’s Cyber Coalition 2022
How might artificial intelligence help NATO allies protect information technology systems, power grids, and other assets?
-
-
New Method Tracks Groups of Anomalous Users
Malicious or fictitious users on internet networks have become the bane of the internet’s existence. Many bemoan the increasing presence of such users, but few have developed methods to track and expose them. Until now.
-
-
$4.8M to Address National Cybersecurity Workforce Shortage
Oregon State University has received $4.8 million from the National Science Foundation to help the United States close a big gap between the number of cybersecurity job openings and the number of qualified applicants for those positions.
-
-
Revised Guidelines for Digital Identification in Federal Systems
NIST’s draft publication features updates intended to help fight online crime, preserve privacy and promote equity and usability.
-
-
Protecting DoD Microelectronics from Adversary Influence
The NSA publicly released four Cybersecurity Technical Reports to help the Department of Defense protect field-programmable gate array (FPGA)-based systems from adversary influence.
-
-
Testing Environments Help Secure Transportation Infrastructure
“All critical infrastructure sectors—including the energy, manufacturing, and transportation sectors—rely heavily on sophisticated technologies like industrial control systems, cellular networks, and artificial intelligence,” said DHS S&T’s Alex Karr. “These are all accessed, monitored, and controlled via the internet, which, in turn, makes them susceptible to hacking, malware attacks, and other malicious activities.”
-
-
Content Moderation Sacrificed in Left-Right Deals on Tech Reform
With time running out on the lame-duck Congress, tech reformers are pushing for votes on a package of bills that stalled over the summer. Three bills—the American Innovation and Choice Online Act (AICOA), the Open App Markets Act (OAMA), and the Journalism Competition and Preservation Act (JCPA)—would write special competition rules for large tech companies in ways that could fundamentally change how tech platforms moderate content like hate speech, disinformation, and incitement to violence.
-
-
Smart AI Tools Could Protect Social Media Users’ Privacy
Digital assistants could help prevent users from unknowingly revealing their views on social, political and religious issues by fighting AI with AI, researchers say.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.