-
Who Cares about a Midterm Election? Comparing Russia, Iran, and China’s Electoral Interference from Past to Present
Midterm elections present a complicated target environment for foreign manipulators because, unlike presidential elections, there is no single candidate who can significantly alter U.S. foreign policy. But interference opportunities remain, and adversaries have the potential to advance their strategic objectives through a campaign meant to create further turbulence within U.S. democracy.
-
-
Secure Communication with Light Particles
Quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Researchers have developed a new, tap-proof communication network.
-
-
Operational Protection of Water Infrastructure Against Cyber-Physical Threats
As the water supply system becomes more digitalized, cyberthreats are increasing. It is time for an all-hazard risk management and mitigation system.
-
-
A Quarter of World's Internet Users Rely on Infrastructure Highly Vulnerable to Attack
About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South.
-
-
Quantum Drone Offers Unrivaled Security
Harnessing the laws of nature – namely quantum physics – a cutting-edge teleportation technology is taking cybersecurity to new, “unhackable” heights using miniscule particles of light or “beams.”
-
-
Inside the Government Fiasco That Nearly Closed the U.S. Air System
The upgrade to 5G was supposed to bring a paradise of speedy wireless. But a chaotic process under the Trump administration, allowed to fester by the Biden administration, turned it into an epic disaster. The problems haven’t been solved.
-
-
When Hurricanes Strike, Social Media Can Save Lives
Social media can be a powerful tool for cities to communicate and to collect information to deploy emergency resources where needed most.
-
-
Identifying and Predicting Insider Threats
Insider threats are one of the top security concerns facing large organizations. Current and former employees, business partners, contractors—anyone with the right level of access to a company’s data—can pose a threat. A new project seeks to detect and predict insider threats.
-
-
Food Production Vulnerable to Cyberattacks
Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.
-
-
S&T Hackathon: Thwarting Emerging Threats to Critical Infrastructure
Threats against the U.S. critical infrastructure are not new—physical threats and natural disasters have challenged the U.S. critical infrastructure and their support systems time and time again. But the rapid development of new information and communication technologies, and their inevitable integration the into the U.S. critical infrastructure, bring with them the possibility of digital attacks and other new challenges that the United States must be ready to face.
-
-
Bad for Computer Security: Employees Returning to the Office
When employees feel they deserve superior technology compared to other employees—and they don’t receive unrestricted access to it—they pose a security risk to their companies, according to a new research.
-
-
Buffalo Attack Footage Spread Quickly Across Platforms, Has Been Online for Days
The livestream of the accused Buffalo shooter’s deadly attack at a Buffalo supermarket was available briefly via Twitch, but the footage spread quickly across online platforms, and remains online for public consumption.
-
-
Faster Ransomware Detection
Ransomware extortion is hugely expensive, and instances of ransomware extortion are on the rise. The FBI reports receiving 3,729 ransomware complaints in 2021, with costs of more than $49 million. What’s more, 649 of those complaints were from organizations classified as critical infrastructure.
-
-
New Method Kills Cyberattacks in Less Than a Second
Researchers, using artificial intelligence, new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second.
-
-
How to Avoid Extremism on Social Media
The internet has been a haven for extremists since long before most people even knew it existed. Today, extremists share their likes and tweet their thoughts like everyone else. But they have also spun off into an ever-widening array of social media sites with greater appetites for hateful words and violent images.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.