• U.S. mulls how to respond to Russian interference in the U.S. elections

    The United States earlier this week has accused Russia of interfering in the U.S. electoral process. Cyber experts found the digital fingerprints of two Russian government hacker groups were behind the hacking of the Democratic National Committee (DNC), the Democratic Congressional Campaign Committee (DCCC), and the Clinton campaign, but it was still a major step for the United States officially and formally to charge that Russia was behind the hacking – an unmistakable evidence that Russia was throwing its weight behind one of the candidates.

  • The Siberian candidate: Russia’s 2-pronged campaign to undermine the U.S. political system

    We now know what the U.S. intelligence community has known for a while: Vladimir Putin has instructed the FSB (Russia’s Federal Security Service) and GRU (the Russian military’s main intelligence agency) to use their considerable cyberwarfare capabilities to help Donald Trump defeat Hillary Clinton in the 8 November. The Russian digital campaign of interference in the U.S. electoral process has intensified. We can only guess what additional actions the Russian government hackers will take in the days immediately before 8 November – and on election day itself.

  • China’s quantum satellite could make data breaches a thing of the past

    China recently launched a satellite into orbit with a unique feature: it has the ability to send information securely, not with mathematical encryption but by using the fundamental laws of physics. China will be the first country to achieve this feat, and it marks a milestone in the development of quantum technologies. The next revolution in technology promises to embrace fundamental laws of physics to enable devices to perform operations that are beyond the bounds of current electronics. For practical quantum communications we need devices integrated into our computers and smartphones that exchange data in a similar way to the quantum satellite. These devices are thankfully just around the corner. In a few years we may look back on digital eavesdropping and massive information breaches from databases as a problem buried in the past.

  • “Security fatigue” may cause computer users to feel hopeless and act recklessly

    After updating your password for the umpteenth time, have you resorted to using one you know you’ll remember because you’ve used it before? Have you ever given up on an online purchase because you just didn’t feel like creating a new account? If you have done any of those things, it might be the result of “security fatigue.” It exposes online users to risk and costs businesses money in lost customers.

  • Penn State cybersecurity club gets competitive

    The members of the Penn State Competitive Cyber Security Organization (CCSO) are embroiled in a game of capture-the-flag. They’re in hot pursuit of the pennant, hoping to find it before their competitors. But instead of dashing across fields and through the woods, they’re gathered in a conference room sharing pizza. And instead of searching for a brightly colored flag, they use their cybersecurity skills to find a “flag” that is actually a special computer file.

  • Former British topless model arrested for links to ISIS

    Former British topless model, 27, arrested for communicating with ISIS recruiters and distributing violent ISIS propaganda videos on social networks. He contact was a British citizens calling himself Abu Usamah al-Britani, a known ISIS recruiter operating out of Syria. Terrorism experts say his “specialty” is trying to persuade young Western women to come to Syria to marry jihadist fighters.

  • Russia using hacking to influence 2016 elections: U.S.

    The United States, in an official statement issued jointly today by James Clapper, the director of national intelligence (DNI), and a high-level official at Department of Homeland Security (DHS), accused Russia of trying to influence the 2016 U.S. elections by using Russian government hackers. The U.S. says the Russian government hackers stole and published archived e-mails from the Democratic National Committee (DNC) and the Democratic Congressional Campaign Committee (DCCC). The official statement also refers to the attempted hacks into the voting systems and voter registration databases in twenty states, but says that the evidence about Russian government involvement in those hacks is not yet conclusive.

  • Our ability to spot phishing e-mails is far from perfect

    Each year, tens of millions of phishing e-mails make it to your inbox, uncaught by your e-mail client’s spam filter. Of those, millions more slide past our own judgment and are clicked and opened. A recent study has revealed just how likely we are to take the bait.

  • Data-mining can be used for detecting multiple hackers

    Security efforts to combat hackers usually focus on one method of attack, but computer scientists have developed a strategy more effective at tackling various types of attacks. Data mining, the process of analyzing big sets of data and organizing it into useful information, is used in all corners of industry, and the computer scientists say that a spam filtering system based on data mining can identify various adversaries, or hackers.

  • DHS awards U Texas San Antonio $3 million to develop, deliver cybersecurity training

    The Department of Homeland Security (DHS) has selected a team led by the University of Texas at San Antonio (UTSA) to develop and deliver cybersecurity training through the Continuing Training Grants (CTG) Program. The 2016 CTG is a $3 million grant to develop and deliver cybersecurity training to support the national preparedness goal to make the United States more secure and resilient.

  • Putin’s cyber play: What are all these Russian hackers up to?

    Russia has been implicated in many breaches of U.S. networks in recent months, most notably the Democratic National Committee and the Democratic Congressional Campaign Committee hacks. On 28 September, FBI Director James Comey told a congressional hearing that Russian hackers have been testing cyberdefenses of voter registration databases in more than a dozen states. What is Russia trying to do with its hacking efforts? One clear goal for the Russian hackers involved in these recent attacks is to make the presidential campaign harder for Democratic nominee Hillary Clinton and easier for her Republican opponent, Donald Trump. Russia is also trying to spread distrust of official viewpoints, particularly those coming from the EU or NATO. With any Western fringe group Russia can attract, it is attempting to stall Western decisions, sow discontent and distrust, and draw apart societies and partnerships.

  • NIST patented single-photon detector for potential encryption, sensing apps

    Individual photons of light now can be detected far more efficiently using a device patented by a team including NIST, whose scientists have overcome longstanding limitations with one of the most commonly used type of single-photon detectors. Their invention could allow higher rates of transmission of encrypted electronic information and improved detection of greenhouse gases in the atmosphere.

  • New encryption method improves privacy protection

    VTT Technical Research Center of Finland has developed a new kind of encryption method for improving the privacy protection of consumers to enable safer, more reliable, and easier-to-use user authentication than current systems allow. The method combines safety, usability, and privacy protection — until now, implementing all three at the same time has been a challenge.

  • Hackers “poking around” U.S. voter registration sites in more than a dozen states: Comey

    James Comey, the FBI director, said his agency has discovered more attempts to hack voter registration sites in more than a dozen states according to two law enforcement officials. The FBI, and investigators working for other law enforcement agencies, say indications are the hackers belong to two cyber units working for the Russian government.

  • Secure passwords can be sent through the human body, instead of air

    Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the encrypted code. Now, computer scientists and electrical engineers have devised a way to send secure passwords through the human body — using benign, low-frequency transmissions generated by fingerprint sensors and touchpads on consumer devices.