-
“Surfing Attack” Hacks Siri, Google with Ultrasonic Waves
Ultrasonic waves don’t make a sound, but they can still activate Siri on your cellphone and have it make calls, take images or read the contents of a text to a stranger. All without the phone owner’s knowledge.
-
-
For Better Cybersecurity, New Tool Fools Hackers into Sharing Keys
Instead of blocking hackers, a new cybersecurity defense approach actually welcomes them. The method, called DEEP-Dig (DEcEPtion DIGging), ushers intruders into a decoy site so the computer can learn from hackers’ tactics. The information is then used to train the computer to recognize and stop future attacks.
-
-
Tools to Help Fight Disinformation Online
Today’s information ecosystem brings access to seemingly infinite amounts of information instantaneously. It also contributes to the rapid spread of misinformation and disinformation to millions of people. Researchers at RAND’s Truth Decay initiative worked to identify and characterize the universe of online tools targeted at online disinformation, focusing on those tools created by nonprofit or civil society organizations.
-
-
Protecting Sensitive Metadata So It Cannot Be Used for Surveillance
MIT researchers have designed a scalable system that secures the metadata of millions of users in communications networks, to help protect the information against possible state-level surveillance. The system ensures hackers eavesdropping on large networks cannot find out who is communicating and when they’re doing so.
-
-
Hackers Are Everywhere. Here’s How Scholars Can Find Them.
The world of cyber operations is full of hard national security choices. Ben Buchanan asks: “How do long-held ideas of counterintelligence, deterrence and deception apply in this new arena of competition? How does escalation work with hacking? Who carried out this intrusion, and what was the intention behind it? Most of all, what does any of this mean for geopolitics in the modern age, and how can scholars communicate that to policymakers?”
-
-
Digital Threats to Democracy
A new study surveyed hundreds of technology experts about whether or not digital disruption will help or hurt democracy by 2030. Of the 979 responses, about 49 percent of these respondents said use of technology “will mostly weaken core aspects of democracy and democratic representation in the next decade,” while 33 percent said the use of technology “will mostly strengthen core aspects of democracy.”
-
-
Spies, Election Meddling, And Disinformation: Past and Present
Calder Walton writes that following Russia’s “sweeping and systematic” attack on the 2016 U.S. presidential election—which was intended to support Moscow’s favored candidate, Donald J. Trump, and undermine his opponent, Hillary Clinton—the media frequently labeled the operation “unprecedented.” “The social-media technologies that Russia deployed in its cyber-attack on the United States in 2016 were certainly new,” he writes, “but Russia’s strategy was far from unusual. In fact, the Kremlin has a long history of meddling in U.S. and other Western democratic elections and manufacturing disinformation to discredit and divide the West.”
-
-
Growing Tory Opposition to Boris Johnson’s Huawei Decision
David Davis, a leading Conservative MP and a former Brexit Secretary, has warned that allowing Chinese technology giant Huawei to build some of the infrastructure for the U.K. 5G communication network could be seen as “the worst decision made by a British prime minister.” The government Huawei move represented the “worst intelligence decision since MI6’s recruitment of Kim Philby,” Davis said, adding that if the government allowed Huawei access to the U.K. 5G infrastructure, then “We are handing the keys to large parts of the country over to China.” Davis was blunt: “This is the ground on which future wars will be fought.”
-
-
U.S. Officials Link COVID-19 Disinformation Campaign to Russian Proxy Accounts
Officials in the United States have said that thousands of Russia-linked social media accounts have launched a coordinated effort to spread alarm and misinformation about the COVID-19 crisis. State Department officials involved in countering Russian disinformation said on 22 February that fake accounts are being used on Twitter, Facebook, and Instagram and are operating in multiple languages.
-
-
Senior U.S. Democrats Demand Russia Sanctions Over 2020 Election Interference
U.S. Senate Democratic leaders have urged the administration to impose sanctions on Russia after U.S. intelligence officials briefed members of Congress that Russia was again trying to interfere in a national election. “We urge you to immediately draw upon the reported conclusions of the Intelligence Community to identify and target for sanctions all those determined to be responsible for ongoing elections interference, including President Putin, the government of the Russian Federation, any Russian actors determined to be directly responsible, and those acting on their behalf or providing material or financial support for their efforts,” the senators write in their letter.
-
-
How Bad Are Cyberattacks for the Economy? Assessing the Damage
Anna Scherbina, an associate professor of finance at Brandeis International Business School, served from 2017 to 2019 as a senior economist on the White House Council of Economic Advisers, where, among other things, she wrote the chapter on cybersecurity in the 2018 Economic Report of the President. She drew particular attention to data breaches and concluded with her colleagues that malicious cyber activity cost the U.S. economy between $57 billion and $109 billion in 2016, or upwards of 0.58 percent of gross domestic product.
-
-
A Human-Machine Collaboration to Defend Against Cyberattacks
Being a cybersecurity analyst at a large company today is a bit like looking for a needle in a haystack — if that haystack were hurtling toward you at fiber optic speed. PatternEx merges human and machine expertise to spot and respond to hacks.
-
-
Reports: Trump Ousted Acting Intel Chief After He Warned of Russian 2020 Election Meddling
President Donald Trump fired Director of National Security Joseph Maguire, the U.S. top intelligence official, after Maguire, in a classified briefing, told lawmakers that the U.S. intelligence community is seeing an intensification of Russia’s covert efforts to help Trump’s reelection campaign. The Kremlin’s campaign, already under way, would combine elements from the Kremlin’s successful 2016 effort to help Trump – hacking of Trump’s rivals and saturating social media with fake postings – with a new emphasis on corrupting voter rolls, hacking voting machines, and disrupting vote tallies. Trump has always rejected the U.S. intelligence community’s unanimous conclusion, based on incontrovertible facts, that Russia heavily interfered on his behalf in the 2016 election, preferring instead to accept Vladimir Putin’s denials that such interference took place.
-
-
Custom Circuits to Make IoT Systems 14,000 Times Harder to Crack than Current Tech
The “internet of things” (IoT) allows devices — kitchen appliances, security systems, wearable technologies and many other applications — to communicate with each other through networks. With the world on the verge of adopting them by the billions, the best possible security is paramount. Engineers have one-upped their own technique to increase security for the “internet of things.” In truth, their upping is far greater than one.
-
-
Enhancing Privacy in Today's Internet of Things
People navigating the digital landscape of today’s internet are bombarded with notices about how their data is being collected. But in the physical world — where internet of things (IoT) technologies increasingly track our activities — few, if any, notices are provided. A team of researchers has created an app and an entire infrastructure to change that.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
By Zachary Roth
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
By Dino Jahic
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
By Trina West
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.