-
What Is the National Cybersecurity Strategy? What the Biden Administration Has Changed
On 2 March 2023 the Biden administration released its first National Cybersecurity Strategy. Some of the key provisions in the Strategy relate to the private sector, both in terms of product liability and cybersecurity insurance. It also aims to reduce the cybersecurity burden on individuals and smaller organizations. It provides some innovative ideas that could strengthen U.S. cybersecurity in meaningful ways and help modernize America’s technology industry, both now and into the future.
-
-
Is Your Cybersecurity Strategy Undermined by These Six Common Pitfalls?
Many security specialists harbor misconceptions about lay users of information technology, and these misconceptions can increase an organization’s risk of cybersecurity breaches. These issues include ineffective communications to lay users and inadequately incorporating user feedback on security system usability.
-
-
Hard-Right Social Media Activities Lead to Civil Unrest: Study
Does activity on hard-right social media lead to civil unrest? With the emergence and persistent popularity of hard-right social media platforms such as Gab, Parler, and Truth Social, it is important to understand the impact they are having on society and politics.
-
-
Perfectly Secure Digital Communications
Researchers have achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden.
-
-
Understanding Antisemitism on Twitter After Musk
New research has found a major and sustained spike in antisemitic posts on Twitter since the company’s takeover by Elon Musk on October 27, 2022. Researchers found that the volume of English-language antisemitic tweets more than doubled in the period following Musk’s takeover.
-
-
Extremist Propaganda Soars to All-Time High in 2022
In 2022, there has been a significant increase in racially or ethnically motivated violent extremist (RMVE) propaganda efforts, which included the distribution of racist and antisemitic fliers, stickers, banners, graffiti, and posters, as well as laser projections - with a total of 6,751 cases reported in 2022, compared to 4,876 in 2021.
-
-
Expanding the AI Toolbox of Cybersecurity Defenders
Scientists have taken a key step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks. DRL shows the promise of an autonomous AI in proactive cyber defense.
-
-
Russian Cyberattacks on U.S. Likely to Become Bolder, More Brazen
Repeated failures by Russian cyberattacks and disinformation campaigns to inflict lasting damage during the Kremlin’s ongoing war against Ukraine is unlikely to dampen Moscow’s resolve and could instead spur a new wave of riskier efforts against a wider set of targets.
-
-
U.S. Unveils Aggressive National Cybersecurity Strategy
The Biden administration is pushing for more comprehensive federal regulations to keep the online realm safer against hackers, including by shifting cybersecurity responsibilities away from consumers to industry and treating ransomware attacks as national security threats.
-
-
Security Vulnerabilities Detected in Drones Made by DJI
Researchers have detected security vulnerabilities, some of them serious, in several drones made by the manufacturer DJI. These enable users, for example, to change a drone’s serial number or override the mechanisms that allow security authorities to track the drones and their pilots. In special attack scenarios, the drones can even be brought down remotely in flight.
-
-
Digital Twins Could Protect Manufacturers from Cyberattacks
Detailed virtual copies of physical objects, called digital twins, hold the promise of better products across automotive, health care, aerospace and other industries. According to a new study, cybersecurity may also fit neatly into the digital twin portfolio.
-
-
Can a Cyber shuffle Stop Hackers from Taking Over a Military Aircraft?
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers to take control of a military jet, commercial airliner or spacecraft. Sandia, Purdue team up to test cyberdefense against an algorithm trained to break it.
-
-
How One of the World's Most Popular Open-Source Security Monitoring Platforms Was Developed
A tool from the internet’s early days keeps Microsoft’s users secure while supporting the open-source paradigm.
-
-
5 Key Takeaways from State of Antisemitism in America Report 2022
For too many American Jews, being Jewish no longer feels as safe as it once did. And the younger those American Jews are, the more they experience that threat firsthand.
-
-
Americans’ Trust in News Continues to Decline – but Local News Are Much More Trusted Than National News
A new study explores the disconnect between newsrooms’ efforts to rebuild the public’s trust and the continued decline of confidence in that effort. The study distinguishes between the practical and emotional dimensions of trust, and finds that that more than twice as many Americans have higher emotional trust in local news than in national news.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
By Zachary Roth
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
By Dino Jahic
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.