-
Russia, Trump and the 2016 election: What’s the best way for Congress to investigate?
Exactly how will the U.S. conduct a fair and accurate investigation into Russian meddling in the 2016 election and links with President Donald Trump’s campaign? U.S. congressional leaders are discussing options. At a time when Congress is sharply polarized along partisan lines, congressional investigations tend to become microcosms of that polarization. This is all the more true when an investigation involves an issue about which the president is vulnerable to political embarrassment or attack. If the intelligence committee proves unable to conduct a thorough and bipartisan investigation of Russian meddling and Trump’s campaign, pressure will build on America’s leaders to establish a more independent probe. Hanging in the balance could be whether the United States can forge consensus about what happened and how to prevent it from happening again.
-
-
How science should respond to fake news
The rise of fake news has dominated the world of politics since the last U.S. election cycle. But fake news is not at all new in the world of science. “Fake news about science has always existed,” says one expert. “What has changed now is social media and the potential to disseminate this kind of news much faster among social networks.”
-
-
How Florida is helping train the next generation of cybersecurity professionals
Our increasingly connected and digital world is vulnerable to attack and needs more skilled professionals who know how to defend it. As connected devices proliferate, particularly smart devices creating what has been called the “Internet of Things,” the problem is getting worse. While we don’t know where and when the next cyber threats will arise, we can be sure that our society’s use of and demand for digital connections will only grow. As a result, we’ll also see the demand for cybersecurity professionals rise – and the opportunities for new ways of thinking, learning and collaborating.
-
-
Protecting bulk power Systems from hackers
Most of us take turning the lights on for granted. In reality, the energy we draw from the electrical grid to brighten homes, freeze food and watch TV is part of a complicated and widespread system. Understanding that system’s vulnerabilities and reliability is a crucial step towards improving its security. Reliability measures of electrical grid has risen to a new norm as it involves physical security and cybersecurity. Threats to either can trigger instability, leading to blackouts and economic losses.
-
-
Center for Long-Term Cybersecurity unveils 2017 research grantees
The Center for Long-Term Cybersecurity (CLTC) has announce the recipients of its 2017 research grants. In total, twenty-seven different groups of researchers will share a total of nearly $1 million in funding. CLTC says that the projects span a wide range of topics related to cybersecurity, including new methods for making crypto-currencies more secure; protecting health information stored on mobile devices; teaching high-school computer science students how to “program for privacy”; and exploring potential limits on the use of digital controls in nuclear reactors.
-
-
Information on hacking tool could be of use to “hostile entities”: FBI
The FBI on Monday said it was right for the agency to withhold documents which detail how it unlocked an iPhone used by one of the San Bernardino, California, shooters. The FBI said that the information, if released, could be exploited by “hostile entities.” The Justice Department, in response to a FOIA law suit by the AP, Vice Media, and Gannett, the parent company of USA Today, earlier this month released heavily redacted records relating to the incident – but withheld information about how much the FBI paid a third party to unlock the work phone of Syed Rizwan Farook.
-
-
Child from Pittsburgh admits to hack attempt of Brussels Airport after ISIS attacks
A Pittsburgh child has admitted to launching a cyberattack against Brussels Airport in the aftermath of the 22 Mach 2016 suicide bombing by Belgian ISIS followers, which killed more than thirty people. The Belgian federal public prosecutor’s office said the suspect aimed to take down the website of the airport operator – the Brussels Airport Company — and “infiltrate the computer system,” but was unsuccessful.
-
-
Cyberattacks increase stress hormone levels, perceptions of vulnerability
A new study shows that individuals exposed to a simulated cyberterror attack had significantly increased levels of the stress hormone cortisol in their saliva compared to a control group. Following the cyberattack, study participants were more likely to fear an imminent cyberthreat and to express feelings of personal insecurity.
-
-
New technique identifies smartphone thieves in seconds
Three million phones were stolen in the United States. Ben-Gurion University of the Negev (BGU) researchers have developed a technique that identifies a smartphone thief or intruder in under fourteen seconds.
-
-
ISIS followers hack U.K. National Health Service
ISIS-linked hackers have attacked and defaced several NHS (U.K. National Health Service) websites in a series of cyberattacks. The hackers, going by the name of Tunisian Fallaga Team, targeted six websites three weeks ago, replacing legitimate web pages with graphic photos of the war in Syria. The attacks said they were retaliating for the West’s interference in the Middle East.
-
-
How computer hacking is becoming Russia’s weapon of choice
The Russian government has long been known to source its technology, world-class hacking talent, and even some intelligence information from local cybercrime rings. What’s more, this criminal fraternity probably receives state immunity for cybercrimes committed outside Russia in return for offering services to the Russian state. Russia’s clear long-term strategy is to use the internet to further its aims in information warfare. It has proved that this form of warfare is more potent than kinetic warfare and that it can reap the benefits quickly and without fear of a coordinated response from the United States or NATO. Its use of criminal cyber rings ensures that it benefits from no (provable) direct links to the Russian government. A further downside is that China, North Korea, and Iran seem to be copying this model and have already been active in attacks against other nation states. The internet has changed mass communication in countless positive ways. But it is becoming an increasingly dangerous tool for subversive activity. A re-think and a re-boot are looking increasingly necessary.
-
-
Protecting quantum computing networks against hackers
As we saw during the 2016 U.S. election, protecting traditional computer systems, which use zeros and ones, from hackers is not a perfect science. Now consider the complex world of quantum computing, where bits of information can simultaneously hold multiple states beyond zero and one, and the potential threats become even trickier to tackle. Even so, researchers have uncovered clues that could help administrators protect quantum computing networks from external attacks.
-
-
Trump loosens sanctions on Russian intelligence agency which helped his 2016 campaign
The Trump administration has loosened sanctions imposed by Barack Obama on Russia’s Federal Security Service (FSB), one of the two Russian government intelligence agencies which actively interfered in the U.S. 2016 presidential campaign in order to help Trump win. The loosening of the sanctions would make it easier for American companies to do business with the FSB, which is the successor of the KGB.
-
-
NATO must more firmly counter Russia's cyber-weaponry: U.K defense minister
NATO must begin to compete on the cyber-battlefield to counter Russian hacking aimed at undermining democracy in the United States and Western Europe, the British defense secretary, Sir Michael Fallon, has said in a speech earlier today (Thursday, 2 February) at St. Andrews University, one of the main centers for Russian studies in the United Kingdom. In his harshest and most pointed criticism yet of Russia, he accused Moscow of targeting the United States, France, Germany, Holland, Bulgaria, and Montenegro.
-
-
Global entities come shopping for Israeli cybersecurity
As computer devices and Internet of Things (IoT) connectivity continue to break new boundaries and create changes to our lifestyle, new cybersecurity technologies to defend our tech-savvy lives are crucial. “We’re still at the beginning for the cyber arena. We still need the security solution for smart homes, we still don’t have security solutions for autonomous cars, or for connected medical devices or MRI machines, or for connected kitchen appliances. Every technology that will be introduced to our lives in the coming years will need a cyber solution,” says one expert.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.