• Flaw in iVote System Used in Australian Election

    Flaws in the iVote internet and telephone voting system used in the 2019 New South Wales election could have made it vulnerable to undetectable voter fraud, a new report has revealed. A new report has shown how the iVote system suffers from an error in its verification process that could allow the verification of votes to be “tricked”, meaning some valid votes could be converted into invalid ones, and not counted.

  • Who's Responsible When Your Car Gets Hacked?

    In the future, when cars can drive themselves, grand theft auto might involve a few keystrokes and a well-placed patch of bad computer code. At that point, who will be liable for the damages caused by a hacker with remote control of a 3,000-pound vehicle?

  • Secure Data Transmission with Ultrasound

    Due to the Internet of Things (IoT), an increasing number of devices have learned to communicate with each other. Ultrasound communication is an entirely new method for data exchange between IoT devices and mobile phones. Researchers have now developed a first open communication protocol including an open-source development kit for ultrasound communication which makes near-field communication safer.

  • Online Disinformation and Emerging Tech: Are Democracies at Risk?

    Online disinformation campaigns supported by fundamental changes in military and geopolitical strategies of major players such as Russia and China harden tribal factions and undermine the security of infrastructure systems in targets such as the United States, as state and non-state actors mount increasingly sophisticated cyberattacks on democratic institutions, Brad Allenby writes. Whether the United States and other democracies are up to this challenge remains to be seen, he says.

  • White Supremacists Embrace "Accelerationism"

    Accelerationism is a term white supremacists have assigned to their desire to hasten the collapse of society as we know it. The term is widely used by those on the fringes of the movement, who employ it openly and enthusiastically on mainstream platforms, as well as in the shadows of private, encrypted chat rooms. 

  • UAH to Offer H4Di Cybersecurity Course

    The University of Alabama in Huntsville (UAH) says it will be the first in the state to offer the Hacking for Defense (H4Di) cybersecurity class beginning in spring semester 2020. H4Di teaches students to work with the defense and intelligence communities to rapidly address the nation’s emerging threats and security challenges.

  • Russian Hackers Attacked Me and Other Military Spouses. Why Can’t We Sue?

    In a systematic campaign aiming to sow panic and confusion, Russian government hackers, masquerading as ISIS fighters, have been hacking computers and smartphones of spouses of U.S. military personnel, stealing and distributing their personal and financial information, and spreading lies about the on the dark web. “Almost as astonishing as the discovery that Russia was behind the attacks was finding out that U.S. citizens have no legal recourse against foreign governments that target them online,” writes Lorri Volkman, whose husband serves in the military, and was attacked by Russian hackers four years ago.

  • New Report on Russia’s Online Operations: Pseudo-Think Tanks, Personas

    The Kremlin used many different techniques in its effective campaigns of interference in the politics of Western democracies, including the 2016 U.S. presidential election. One such technique is “narrative laundering” – the technique of moving a certain narrative from its state-run origins to the wider media ecosystem through the use of aligned publications, “useful idiots,” and, perhaps, witting participants. “Given that many of these tactics are analogs of those used in Cold-War influence operations, it seems certain that they will continue to be refined and updated for the internet era, and are likely to be used to greater effect,” a new report says.

  • Why Cyber Operations Do Not Always Favor the Offense

    Among policymakers and analysts, the assumption that cyberspace favors the offense is widespread. Those who share this assumption have been urging the U.S. government to prioritize offensive cyber operations. Rebecca Slayton writes that the belief in offense dominance is understandable – but mistaken: A focus on offense “increases international tensions and states’ readiness to launch a counter-offensive after a cyberattack, and it often heightens cyber vulnerabilities,” she writes.

  • Lessons from the Cyberattack on India’s Largest Nuclear Power Plant

    In early September, a cyberattack occurred at the Kudankulam nuclear power plant in India. The Indian nuclear monitoring agency finally admitted that the nuclear plant was hacked, and on 30 October Indian government officials acknowledged the intrusion. “As the digitalization of nuclear reactor instrumentation and control systems increases, so does the potential for malicious and accidental cyber incidents alike to cause harm,” Alexander Campbell and Vickram Singh write.

  • Here’s How Russia Will Attack the 2020 Election. We’re Still Not Ready.

    In 2016, the GRU, Russia’s military intelligence branch, launched a massive, and successful disinformation campaign to change the way Americans were talking about the two candidates – Hillary Clinton and Donald Trump. Among the GRU’s most effective disinformation techniques was one known as “narrative laundering,” which aims to inject the Kremlin’s preferred stories – real, fake, or doctored — into mainstream American media. “It is quite possible that these exact techniques will be used again,” Renee DiResta, Michael McFaul, and Alex Stamos write. “And why shouldn’t they? We’ve done almost nothing to counter the threat.”

  • Fighting Deepfakes When Detection Fails

    Deepfakes intended to spread misinformation are already a threat to online discourse, and there is every reason to believe this problem will become more significant in the future. Automated deepfake detection is likely to become impossible in the relatively near future, as the approaches that generate fake digital content improve considerably.

  • Germany: Far-Right Lawmaker Punished over Anti-Semitism

    German lawmakers on Wednesday, in a move which is unprecedented in modern German history, removed a far-right politician from his position as the chairman of the powerful Legal Affairs Committee of the Bundestag. The move came after the politician, Stephan Brandner, has repeatedly made anti-Semitic comments. All the parties in the Bundestag, except his own AfD party, voted to strip him of the committee’s chairmanship.

  • Private Vendors Critical to Election Security Inadequately Supervised

    Private vendors build and maintain much of the election infrastructure in the United States with minimal oversight by the federal government. A new report presents the risks this poses to the security of our elections and offers a solution.

  • National Labs Host DOE CyberForce Competition

    Five teams of college students will square off at the U.S. Department of Energy’s (DOE) Lawrence Berkeley National Laboratory (Berkeley Lab) on 16 November as part of DOE’s fifth CyberForce Competition. The event, held simultaneously at ten of the DOE’s National Laboratories across the United States, will challenge 105 college teams to defend a simulated energy infrastructure from cyberattacks. The CyberForce Competition is designed to inspire and develop the next generation of energy sector cybersecurity professionals by giving them a chance to hone their skills during interactive and realistic scenarios.