-
Secure Cryptography with Real-World Devices Is Now Possible
New research published in Nature explains how an international team of researchers have, for the first time, experimentally implemented a type of quantum cryptography considered to be the ‘ultimate’, ‘bug-proof’ means of communication.
-
-
China Tried to Infiltrate Federal Reserve: Senate Report
Fed Chair Jerome Powell and a senior member of Congress are at odds over a report issued Tuesday by Senate Republicans alleging that China is trying to infiltrate the Federal Reserve and that the central bank has done too little to stop it. China’s goal, according to the report, is to “supplant the U.S. as the global economic leader and end the U.S. dollar’s status as the world’s primary reserve currency.”
-
-
New Chief Information Officer (CIO) Program at NYU
Created in partnership with Emeritus, the new nine-month executive program helps senior technology leaders and CIOs advance their C-suite leadership skills, transform information systems, and navigate rapidly changing remote and workforce trends.
-
-
There Is a Lot of Antisemitic Hate Speech on Social Media – and Algorithms Are Partly to Blame
Antisemitic incidents have shown a sharp rise in the United States. There were 2,717 incidents in 2021. This represents an increase of 34% over 2020. In Europe, the European Commission found a sevenfold increase in antisemitic postings across French language accounts, and an over thirteenfold increase in antisemitic comments within German channels during the pandemic. Contemporary antisemitism manifests itself in various forms such as GIFs, memes, vlogs, comments and reactions such as likes and dislikes on the platforms. The continuous exposure to antisemitic content at a young age, scholars say, can lead to both normalization of the content and radicalization of the Tik-Tok viewer.
-
-
Your Brain Is Better Than You at Busting Deepfakes
Deepfake videos, images, audio, or text appear to be authentic, but in fact are computer generated clones designed to mislead you and sway public opinion. They are the new foot soldiers in the spread of disinformation and are rife – they appear in political, cybersecurity, counterfeiting, and border control realms. While observers can’t consciously recognize the difference between real and fake faces, their brains can.
-
-
FAU Receives State Grant for Cybersecurity, IT Training
Cybersecurity jobs are expected to grow by a faster-than-average 33 percent over the next 10 years. In addition, cybersecurity-related job postings have increased by 43 percent in the past year. Florida launches a $15.6 million initiative to prepare students and mid-career professionals for jobs in the fields of cybersecurity and information technology.
-
-
NIST Updates Guidance for Health Care Cybersecurity
In an effort to help health care organizations protect patients’ personal health information, NIST has updated its cybersecurity guidance for the health care industry. The revised draft publication aims to help organizations comply with HIPAA Security Rule.
-
-
Solution to Encrypted Messages Being Hacked Before Sending or After Receipt
Message applications must do more to keep user data safe from undetected malware or over-the-shoulder eavesdropping that bypasses encryption before a message has been sent. Researchers have created a new end-to-end encryption mechanism that protects users’ communications at a far higher level than currently experienced on popular applications.
-
-
NIST chooses Kyber, Dilithium and SPHINCS+ as Standards for Post-Quantum Cryptography
NIST has selected CRYSTALS-KYBER, CRYSTALS-Dilithium and SPHINCS+, three security algorithms, as one the new standards for post-quantum cryptography. The underlying technology must ensure that the encryption of sensitive communication will continue to be secure in the coming decades.
-
-
During Pandemic: More News, More Worry
Anxiety and fear went hand in hand with trying to learn more about COVID-19 in the early days of the pandemic in the United States — and the most distressed people were turning on the television and scrolling through social media.
-
-
Google/Apple's Contact-Tracing Apps Susceptible to Digital Attacks
Since the beginning of the COVID-19 pandemic, scientists and health authorities have relied on contact-tracing technologies to help manage the spread of the virus. Yet there’s a major flaw in a framework that many of these mobile apps utilize – one that attackers could exploit to ramp up false positive notifications.
-
-
Confronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet
The global internet—a vast matrix of telecommunications, fiber optics, and satellite networks—is in large part a creation of the United States. Moreover, U.S. strategic, economic, political, and foreign policy interests were served by the global, open internet. The United States now confronts a starkly different reality. The utopian vision of an open, reliable, and secure global network has not been achieved and is unlikely ever to be realized. Today, the internet is less free, more fragmented, and less secure.
-
-
Beliefs in Conspiracy Theories May Not Be Increasing
A new analysis contradicts popular thinking about beliefs in conspiracy theories, suggesting that such beliefs may not have actually increased over time. The new findings challenge widespread perceptions by the public, scholars, journalists, and policymakers.
-
-
U.S. Disrupts North Korea Ransomware Group, Recovers Nearly Half a Million
U.S. law enforcement authorities have disrupted a group of North Korean hackers, recovering nearly half a million dollars in ransom payments it received from a Kansas hospital, a Colorado health care provider and other victims. The North Korea state-sponsored cybercriminals encrypted the Kansas hospital’s servers in May 2021, demanding ransom in exchange for regaining access to its critical computer networks.
-
-
New Computing Security Architecture Protects Sensitive Private Data
Protecting sensitive information on the internet has become an essential feature for computing architectures. Applications that process such data must trust the system software they rely on, such as operating systems and hypervisors, but such system software is complex and often has vulnerabilities that can risk data confidentiality and integrity.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.