-
Thwarting the next generation of cyberattacks
The next generation of cyberattacks will be more sophisticated, more difficult to detect, and more capable of wreaking untold damage on the nation’s computer systems. So the U.S. Department of Defense has given a $3 million grant to a team of computer scientists from the University of Utah and University of California, Irvine, to develop software that can hunt down a new kind of vulnerability that is nearly impossible to find with today’s technology. The team is tasked with creating an analyzer that can thwart so-called algorithmic attacks that target the set of rules or calculations that a computer must follow to solve a problem.
-
-
Cyber espionage campaign, likely sponsored by China, targets Asian countries: FireEye
FireEye has released a report which provides intelligence on the operations of APT 30, an advanced persistent threat (APT) group most likely sponsored by the Chinese government. APT 30 has been conducting cyber espionage since at least 2005, making it one of the longest operating APT groups that FireEye tracks. APT 30 targets governments, journalists, and commercial entities across South East Asia and India.
-
-
New privacy technologies protect personal data better
In Estonia, the public and private sector have databases, the merging and analysis of which could help the state and enterprises make better management decisions. Such consolidation of data, however, would be a serious threat to privacy and violate data protection rules. A researcher suggests a more convenient way of analyzing very sensitive data without the fear of data leak. The new approach would be appropriate for preserving privacy in genome-wide association studies, satellite collision prediction analysis, and conducting labor market studies.
-
-
Do you know where your data is?
Bitglass, a data protection company, undertook an experiment aiming to gain better understanding of what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, landing in five different continents and twenty-two countries within two weeks. Overall, the data was viewed more than 1,000 times and downloaded forty-seven times; some activity had connections to crime syndicates in Nigeria and Russia. “This experiment demonstrates the liquidity of breached data, underscoring the importance of discovering data breaches early,” said Nat Kausik, Bitglass CEO.
-
-
Russian hackers used compromised State Dep. computers to penetrated W.H. systems
U.S. officials said that Russian hackers who penetrated the computer systems of the U.S. State Department in recent months were able to use the access they gained to penetrate parts of the White House computer system. Experts from government agencies looking into the incident say the breach is one of the most sophisticated attacks to have been directed at U.S. government systems. The hackers used computers around the world to mask their penetration, but investigators were able to identify codes and other markers which point to hackers working for the Russian government.
-
-
Computer engineers battle malicious bots
Defending Web sites from malicious intruder bots is not unlike fighting viruses: neutralize them and they reinvent themselves, finding new ways to penetrate. IT security designers, however, still hold an advantage over some automated programs masquerading as people. To date, there are human abilities too complex to imitate. Exploiting that weakness is central to an Internet security technology developed by researchers who have come up with a new method for distinguishing humans from computers. Their next-gen CAPTCHA — a brief test that computer users must pass in order to access a Web site — requires viewers to identify text, but presents it in video animation rather than in the distorted, static letters users now identify and reproduce to gain admittance.
-
-
Police department pays ransom after hackers encrypt department’s data
Last December, cyberterrorists hacked into servers belonging to the Tewksbury Police Department, encrypted the data stored, and later asked for a $500 bitcoin ransom to be paid before department officials could regain control of their files. The attack is known as the CryptoLocker ransomware virus, and it points to a new frontier in cyberterrorism.
-
-
China increasing significantly funding for cyber warfare capabilities
U.S. intelligence officials have warned that China is increasing significantly its investment in cyber warfare programs in an attempt to compete with the U.S. military. The new spending initiative is part of a long-term, large-scale resource reallocation strategy aiming to make China one of the most capable cyber warfare nations. The increases are an effort by the Chinese to improve their cyber capabilities following the realization that they are lagging behind U.S. programs in significant ways.
-
-
Hackers with “Anonymous” threaten to “erase Israel from cyberspace”
In a new video posted online, hackers operating under the “Anonymous” flag have threatened to erase Israel from cyberspace. Citing reasons which include “continuous aggression, bombing, killing, and kidnapping of the Palestinian people,” the hackers vowed to unleash cyber “squadrons” that will launch a “cyber holocaust” on 7 April, a little more than a week before Israel’s 16 April Holocaust Remembrance day, known as Yom HaShoah.
-
-
NSA’s recruitment effort challenged by Snowden leaks, private sector competition
The NSA employs roughly 35,000 people nationwide and anticipates on recruiting at least 1,000 workers each year. For 2015, the agency needs to find 1,600 recruits, hundreds of whom must come from highly specialized fields like computer science and mathematics. The agency has been successful so far, but still faces recruitment challenges in the aftermath of the Edward Snowden revelations and competition from private sector firms who offer recruits much higher salaries.
-
-
New encryption code to take on toughest of cyber attacks
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
-
-
U.S. grid vulnerable to cyber, physical attacks
The U.S. electric grid remains vulnerable to cyber and physical attacks, putting millions of households at risk from outages that could last a few days or weeks. Attacks on the grid occur once every four days, and though no great harm has been caused, some experts are warning that the series of small-scale incidents may point to broader security problems. “It’s one of those things: One is too many, so that’s why we have to pay attention,” says one expert. “The threats continue to evolve, and we have to continue to evolve as well.”
-
-
New technology combats mobile malware attacks
As mobile phones increase in functionality, they are becoming increasingly ubiquitous in everyday life. At the same time, these devices also are becoming easy targets for malicious activities.One of the primary reasons for such malware explosion is user willingness to download applications from untrusted sources that may host apps with hidden malicious codes. Once installed on a smartphone, such malware can exploit it in various ways. Researchers have developed simple but effective techniques to prevent sophisticated malware from secretly attacking smartphones.
-
-
Yahoo to offer user-friendly e-mail encryption service
Yahoo has announced plans to create its own e-mail encryption plug-in for Yahoo Mail users this year, adding to already growing competition among Silicon Valley firms to capitalize on consumers increased privacy desires. The service will feature “end-to-end” encryption, or the locking up of message contents so that only the user and receiver have access to the information — typically a more advanced and time consuming process which involves specific software and encryption codes.
-
-
A 2-square-meter model city shows cyber-threats real cities face
In a secret location in New Jersey, Ed Skoudis operates CyberCity, a model town of 15,000 people, which employs the same software and control systems used by power and water utilities in major cities. CyberCity has its own Internet service provider, bank, media outlets, military base, hospital, and school. The two-square-meter model town serves as a mock staging ground for the cyber threats faced by city officials around the world. There, computer security professionals get offensive and defensive training in their battle against hackers. Skoudis, founder of CounterHack, designed CyberCity four years ago when military clients complained that most cybersecurity training felt too much like video games.
-
More headlines
The long view
What Does Netflix’s Drama “Adolescence” Tell Us About Incels and the Manosphere?
By Lewys Brace
While Netflix’s psychological crime drama ‘Adolescence’ is a work of fiction, its themes offer insight into the very real and troubling rise of the incel and manosphere culture online.
Confronting Core Problems in Cybersecurity
By Sara Frueh
It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul —a testament to how disruptive these attacks have become.
Voting from Your Sofa Is Secure Enough – but Will It Be Allowed?
By Sølvi Normannsen
A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.