• Secure Cryptography with Real-World Devices Is Now Possible

    New research published in Nature explains how an international team of researchers have, for the first time, experimentally implemented a type of quantum cryptography considered to be the ‘ultimate’, ‘bug-proof’ means of communication.

  • China Tried to Infiltrate Federal Reserve: Senate Report

    Fed Chair Jerome Powell and a senior member of Congress are at odds over a report issued Tuesday by Senate Republicans alleging that China is trying to infiltrate the Federal Reserve and that the central bank has done too little to stop it. China’s goal, according to the report, is to “supplant the U.S. as the global economic leader and end the U.S. dollar’s status as the world’s primary reserve currency.”

  • New Chief Information Officer (CIO) Program at NYU

    Created in partnership with Emeritus, the new nine-month executive program helps senior technology leaders and CIOs advance their C-suite leadership skills, transform information systems, and navigate rapidly changing remote and workforce trends.

  • There Is a Lot of Antisemitic Hate Speech on Social Media – and Algorithms Are Partly to Blame

    Antisemitic incidents have shown a sharp rise in the United States. There were 2,717 incidents in 2021. This represents an increase of 34% over 2020. In Europe, the European Commission found a sevenfold increase in antisemitic postings across French language accounts, and an over thirteenfold increase in antisemitic comments within German channels during the pandemic. Contemporary antisemitism manifests itself in various forms such as GIFs, memes, vlogs, comments and reactions such as likes and dislikes on the platforms. The continuous exposure to antisemitic content at a young age, scholars say, can lead to both normalization of the content and radicalization of the Tik-Tok viewer.

  • Your Brain Is Better Than You at Busting Deepfakes

    Deepfake videos, images, audio, or text appear to be authentic, but in fact are computer generated clones designed to mislead you and sway public opinion. They are the new foot soldiers in the spread of disinformation and are rife – they appear in political, cybersecurity, counterfeiting, and border control realms. While observers can’t consciously recognize the difference between real and fake faces, their brains can.

  • FAU Receives State Grant for Cybersecurity, IT Training

    Cybersecurity jobs are expected to grow by a faster-than-average 33 percent over the next 10 years. In addition, cybersecurity-related job postings have increased by 43 percent in the past year. Florida launches a $15.6 million initiative to prepare students and mid-career professionals for jobs in the fields of cybersecurity and information technology.

  • NIST Updates Guidance for Health Care Cybersecurity

    In an effort to help health care organizations protect patients’ personal health information, NIST has updated its cybersecurity guidance for the health care industry. The revised draft publication aims to help organizations comply with HIPAA Security Rule.

  • Solution to Encrypted Messages Being Hacked Before Sending or After Receipt

    Message applications must do more to keep user data safe from undetected malware or over-the-shoulder eavesdropping that bypasses encryption before a message has been sent. Researchers have created a new end-to-end encryption mechanism that protects users’ communications at a far higher level than currently experienced on popular applications.

  • NIST chooses Kyber, Dilithium and SPHINCS+ as Standards for Post-Quantum Cryptography

    NIST has selected CRYSTALS-KYBER, CRYSTALS-Dilithium and SPHINCS+, three security algorithms, as one the new standards for post-quantum cryptography. The underlying technology must ensure that the encryption of sensitive communication will continue to be secure in the coming decades.

  • During Pandemic: More News, More Worry

    Anxiety and fear went hand in hand with trying to learn more about COVID-19 in the early days of the pandemic in the United States — and the most distressed people were turning on the television and scrolling through social media.

  • Google/Apple's Contact-Tracing Apps Susceptible to Digital Attacks

    Since the beginning of the COVID-19 pandemic, scientists and health authorities have relied on contact-tracing technologies to help manage the spread of the virus. Yet there’s a major flaw in a framework that many of these mobile apps utilize – one that attackers could exploit to ramp up false positive notifications.

  • Confronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet

    The global internet—a vast matrix of telecommunications, fiber optics, and satellite networks—is in large part a creation of the United States. Moreover, U.S. strategic, economic, political, and foreign policy interests were served by the global, open internet. The United States now confronts a starkly different reality. The utopian vision of an open, reliable, and secure global network has not been achieved and is unlikely ever to be realized. Today, the internet is less free, more fragmented, and less secure.

  • Beliefs in Conspiracy Theories May Not Be Increasing

    A new analysis contradicts popular thinking about beliefs in conspiracy theories, suggesting that such beliefs may not have actually increased over time. The new findings challenge widespread perceptions by the public, scholars, journalists, and policymakers.

  • U.S. Disrupts North Korea Ransomware Group, Recovers Nearly Half a Million

    U.S. law enforcement authorities have disrupted a group of North Korean hackers, recovering nearly half a million dollars in ransom payments it received from a Kansas hospital, a Colorado health care provider and other victims. The North Korea state-sponsored cybercriminals encrypted the Kansas hospital’s servers in May 2021, demanding ransom in exchange for regaining access to its critical computer networks.

  • New Computing Security Architecture Protects Sensitive Private Data

    Protecting sensitive information on the internet has become an essential feature for computing architectures. Applications that process such data must trust the system software they rely on, such as operating systems and hypervisors, but such system software is complex and often has vulnerabilities that can risk data confidentiality and integrity.