-
How Chinese Companies Are Challenging National Security Decisions That Could Delay 5G Network Rollout
In many countries, governments have decided to block Chinese companies from participating in building communication infrastructure in their countries because of national security concerns. Chinese companies and investors often refuse to take such national security changes lying down. With varying degrees of success, firms have mounted a range of formal and informal challenges in recent years.
-
-
Cybersecurity Defense Software Put Through the Wringer at NATO’s Cyber Coalition 2022
How might artificial intelligence help NATO allies protect information technology systems, power grids, and other assets?
-
-
New Method Tracks Groups of Anomalous Users
Malicious or fictitious users on internet networks have become the bane of the internet’s existence. Many bemoan the increasing presence of such users, but few have developed methods to track and expose them. Until now.
-
-
Revised Guidelines for Digital Identification in Federal Systems
NIST’s draft publication features updates intended to help fight online crime, preserve privacy and promote equity and usability.
-
-
Protecting DoD Microelectronics from Adversary Influence
The NSA publicly released four Cybersecurity Technical Reports to help the Department of Defense protect field-programmable gate array (FPGA)-based systems from adversary influence.
-
-
Testing Environments Help Secure Transportation Infrastructure
“All critical infrastructure sectors—including the energy, manufacturing, and transportation sectors—rely heavily on sophisticated technologies like industrial control systems, cellular networks, and artificial intelligence,” said DHS S&T’s Alex Karr. “These are all accessed, monitored, and controlled via the internet, which, in turn, makes them susceptible to hacking, malware attacks, and other malicious activities.”
-
-
New ‘Faraday Cage’ Research Facility to Help Combat Digital Crime
University of Huddersfield installing a new facility named the ‘Faraday Cage’ which will help speed-up the development and testing of new digital forensic processes to help law enforcement meet the huge growth rate in digital crime.
-
-
Major Global Security Challenges
What are the major threats the world is facing? Researchers highlight five such threats: The growing role of disinformation; attacks on the idea of democracy; environmental challenges; economic instability; and terrorism – both domestic and foreign.
-
-
Mathematics Works in Serendipitous Ways
In the digital era and moving towards quantum computing, protecting data against hack attacks is one of our biggest challenges. Mathematical theorem used to crack U.S. government encryption algorithm.
-
-
Smart Inverters’ Vulnerability to Cyberattacks Needs to Be Identified and Countered
A survey of threats to microgrids from small power sources can help security experts develop solutions.
-
-
Consumers Feel Left Out of Debates on Cyberattacks and Data Security
Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.
-
-
Simple Hardware to Defend Against Microgrid Attacks
An inexpensive piece of hardware integrated with solar panel controllers can protect isolated power networks from cyberattacks.
-
-
Examining Vulnerabilities of Electric Vehicle Charging Infrastructure
With electric vehicles becoming more common, the risks and hazards of a cyberattack on electric vehicle charging equipment and systems also increases. Reviewing the vulnerabilities of EV charging infrastructure would help prioritize grid protections and informs policy makers.
-
-
The Human Side of Cybersecurity
We might think of cybersecurity as being mostly about firewalls, antivirus software, spam filters, and dDOS detection, but it is often social engineering and human failure that leads to breaches of computer systems and networks rather than sophisticated malware.
-
-
Smart Home Hubs Leave Users Vulnerable to Hackers
Machine learning programs mean even encrypted information can give cybercriminals insight into your daily habits.
-