-
Thinking Like a Cyberattacker to Protect User Data
A component of computer processors that connects different parts of the chip can be exploited by malicious agents who seek to steal secret information from programs running on the computer. Researchers develop defense mechanisms against attacks targeting interconnection of chips in computers.
-
-
Violent Extremist Music Prevalent on Spotify, While Platform Largely Declines to Act
Music has long been an effective way to radicalize extremists, allowing artists to both entertain and indoctrinate vulnerable listeners. Researchers have identified 40 racially or ethnically motivated violent extremist (RMVE) artists with a presence on Spotify, the world’s largest music streaming platform.
-
-
Fighting Foreign Interference
Many in Europe did not take the foreign interference threat seriously until Russia launched its war against Ukraine on 24 February, even though European nations were already subjected to a form of hybrid warfare from Russia with cyberattacks on hospitals during the Covid-19 pandemic, attacks on public institutions, attempts to corrupt leaders and financing of political parties. China’s emerging interference campaign emulates Russia’s. Their goal is :to ensure the democracies no longer functioned and gave way to authoritarian regimes,” says a European expert.
-
-
Majority of Posts on Extremist Online Forums Made by “Hyper” Poster Cliques
Most posts in extremist online forums are made by a clique of particularly committed members, a major new study shows. An analysis of the chatrooms have also discovered they have identical participation structures.
-
-
More Governments Use Spyware to Monitor Their People, Compromising Privacy
The right to privacy is under siege as an increasing number of governments are using spyware to keep tabs on their people. Many governments are using modern digital networked technologies to monitor, control and oppress their populations.
-
-
EFF’s “Cover Your Tracks” Will Detect Your Use of iOS 16’s Lockdown Mode
Apple’s new iOS 16 offers a powerful tool for its most vulnerable users. Lockdown Mode reduces the avenues attackers have to hack into users’ phones by disabling certain often-exploited features. But there is a catch.
-
-
A Retrospective Post-Quantum Policy Problem
In May 2022, a White House memorandum warned that a quantum computer of sufficient size and sophistication will be capable of breaking much of the public-key cryptography used on digital systems across the United States and around the world. The various steps taken by the administration, and proposed by lawmakers, to deal with the problem are all forward-looking. “However, despite these efforts, policymakers have given little or no attention to what could be called a retrospectivepost-quantum problem,” Herb Lin writes. “Policymakers would be wise to consider the very real possibility that in a PQC[post-quantum computing] world, messages they once believed would be kept secret could in fact be made public.”
-
-
Three Iranian Nationals Charged with Cyber Plots Against U.S. Critical Infrastructure Providers
An indictment was unsealed Wednesday charging three Iranian nationals with allegedly orchestrating a scheme to hack into the computer networks of multiple U.S. victims, including critical infrastructure providers. The defendants’ hacking campaign exploited known vulnerabilities in commonly used network devices and software applications to gain access and exfiltrate data and information from victims’ computer systems.
-
-
Off-the-Shelf Crypto-Detectors Give a False Sense of Data Security
A team of computer scientists outlines a leading reason behind insecure data and makes recommendations about how to fix the problem.
-
-
NYU to Create Comprehensive Cybersecurity and Resiliency Program
The quantity, velocity and variety of cybersecurity attacks worldwide reflect the proliferation of connected devices, advances in extended reality systems, AI, telecommunications, and global supply chains powered by the Internet. At the same time, there is a shortfall of cybersecurity and resiliency experts with real-world training and immersion in cutting-edge research and technology to face these challenges.
-
-
What Fake News About Spiders Can Teach Us About the Global Spread of (Mis)information
It’s no secret that the internet and social media fuel rampant spread of (mis)information in many areas of life. Now, researchers have explored this phenomenon as it applies to news about spiders. The verdict? Don’t blindly trust anything you read online about these eight-legged arthropods — or anything else for that matter — and always consider the source.
-
-
What Would It Take to Survive an EMP Attack?
We are increasingly vulnerable to both natural disruptions and military attacks on our power grids. An electromagnetic pulse impulses (EMPs) would destroy your electronics, leaving you and your surroundings intact — but without easy means of survival. Remember, almost all conventional power sources and the entire internet would be knocked out and might take many months to replace.
-
-
Protecting National Public Warning System from EMPs
DHS released a report of operational approaches to protect the National Public Warning System from an electromagnetic pulse (EMP). The report summarizes recommendations that federal, state, local agencies, and private sector critical infrastructure owners and operators can employ to protect against the effects of an EMP event.
-
-
Risks of North Korean Chemical, Biological Weapons; EMP; and Cyber Threats
What WMD and cyber capabilities does North Korea currently have? How does North Korea use or threaten to use these capabilities? What are North Korea’s goals in employing its WMD and cyber capabilities? What impact could this use have? How can the ROK-U.S. rein in and defeat the North’s WMD and cyber capabilities?
-
-
Truth Decay in Europe
What is the empirical evidence for the trends, drivers and consequences of Truth Decay in Europe, and how does that compare with what was found for the United States? To what extent does this evidence apply across Europe as a whole, or are there differences within Europe in the empirical evidence of trends, drivers and consequences of Truth Decay? What are the implications of applying the conceptual framework developed for the United States framework of Truth Decay in Europe? Which areas need to be further investigated in order to tackle Truth Decay in Europe?
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.