-
Why Do Self-Driving Cars Crash?
As they traverse the air, land, or sea, encountering one another or other obstacles, these autonomous vehicles will need to talk to each other. Experts say we need to inject cybersecurity at every level of the autonomous vehicle networks of the future.
-
-
Nextgen Cybersecurity: A 5G-Enabled AI-Based Malware Classification System
Researchers develop a 5G-enabled deep learning approach for classifying malware attacks on the Industrial Internet of Things.
-
-
Cybercrime Insurance Is Making the Ransomware Problem Worse
Cybercrime insurance is making the ransomware problem worse During the COVID-19 pandemic, there was another outbreak in cyberspace: a digital epidemic driven by ransomware. Businesses are turning to cyberinsurance companies in desperation to protect themselves from attack. But the growth of the cyberinsurance market is only encouraging criminals to target companies that have extortion insurance.
-
-
Man Charged for Participation in LockBit Global Ransomware Campaign
A criminal complaint filed in the District of New Jersey was earlier this week, charging a dual Russian and Canadian national for his alleged participation in the LockBit global ransomware campaign.
-
-
No Evidence of Any Voting Machine Compromised: CISA
“We have seen no evidence that any voting system deleted or lost votes, changed votes, or was any way compromised in any race in the country”: CISA
-
-
Improving Security for Smart Systems
In an increasingly connected and smart world, sensors collect and share large amounts of data to help people make decisions. Researchers has recently developed a way to statistically analyze such complex sensor data, so that the computer algorithms that make data-based decisions can be more resilient and better able to cope with small errors.
-
-
U.S. Officials Hope Confidence Campaign Pays Off for Midterm Elections
“Americans should go to the ballot box with confidence,” Jen Easterly, the director of the Cybersecurity and Election Security Agency (CISA), told a cybersecurity forum late last month. Yet U.S. officials also acknowledge the threats to Tuesday’s elections are serious and are being treated with proper caution.
-
-
In Disasters, People Are Abandoning Official Info for Social Media. How to Know What to Trust
In an emergency, where do you turn to find out what’s going on and what you should do to stay safe? The rise of social media has seen community groups, volunteers and non-government organizations nudging out official channels. While these informal sources often provide faster, more local information, they may also be less reliable than government sources.
-
-
The Conspiracy Theorist “Worldview” and the Language of Their Argument
A study has analyzed the difference between mainstream and conspiracy articles. It found that conspiracies rely on other conspiracies as “evidence,” jumping around different topics, less coherently than mainstream texts, but relying on a web of interconnected ideas to connect the dots.
-
-
Cybersecurity Professionals May Be Burning Out at a Faster Rate Than Frontline Health Care
More attention should be paid to the fast rate of burn-out among cybersecurity professionals. Hundreds of thousands of cybersecurity jobs are vacant owing to lack of cybersecurity talent – and that number is growing, among other things, by thousands of cybersecurity professionals who leave the field after a few short years.
-
-
DHS Unveils New Cybersecurity Performance Goals for Critical Infrastructure
DHS released the Cybersecurity Performance Goals (CPGs), voluntary practices that outline the highest-priority baseline measures businesses and critical infrastructure owners of all sizes can take to protect themselves against cyber threats.
-
-
Ensuring Our Workforce Is Cyber Ready
Remaining vigilant and prepared to protect our nation’s cybersecurity is one of DHS S&T’s highest priorities. To meet this goal, S&T is harnessing the intellectual power of America’s universities and leveraging some of the best and brightest subject matter experts and academic minds via S&T Centers of Excellence (COE).
-
-
Extracting Personal Information from Anonymous Cell Phone Data
Researchers haves extracted personal information, specifically protected characteristics like age and gender, from anonymous cell phone data using machine learning and artificial intelligence algorithms, raising questions about data security.
-
-
Improving Recovery of Critical Systems after Cyberattacks
Researchers aim to develop fast, accurate and efficient recovery mechanisms that, when coupled with the expeditious damage assessment techniques he has already developed, will offer an “integrated suite solution.” This will allow affected CI systems to continue running while providing as many critical functionalities as possible.
-
-
Nobel-Winning Quantum Weirdness Undergirds an Emerging High-Tech Industry, Promising Better Ways of Encrypting Communications and Imaging Your Body
There are several emerging technologies which rely on the non-intuitive quantum phenomenon of entanglement: Unhackable communications devices, high-precision GPS and high-resolution medical imaging. For the most part, quantum entanglement is still a subject of physics research, but it’s also a component of commercially available technologies, and it plays a starring role in the emerging quantum information processing industry.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.