• Russia Report: Intelligence Expert Explains How U.K. Ignored Growing Threat

    By Dan Lomas

    The new report on Russia from parliament’s Intelligence and Security Committee (ISC) is damning. The document certainly isn’t a page-turner, and nor does it provide all the answers some had expected. But contrary to most ISC reports, it’s striking and blunt, and the message couldn’t be clearer: Russia’s intelligence agencies pose a direct threat to the U.K., but successive governments and the U.K. agencies have taken their eye off the ball.

  • DHS, NSA Name Binghamton a Cyber Research Center

    In June, the National Security Agency and the Department of Homeland Security named Binghamton a National Center of Academic Excellence in Cyber Research (CAE-R) through 2025. “The main goals,” said Professor Ping Yang, who is the director of the Center for Information Assurance and Cybersecurity (CIAC), “are to reduce the vulnerability in the information infrastructure of the United States by promoting higher education and research in cyber-defense and producing professionals with cyber-defense expertise.”

  • Twitter Hack Exposes Broader Threat to Democracy and Society

    By Laura DeNardis

    In case 2020 wasn’t dystopian enough, hackers on July 15 hijacked the Twitter accounts of former President Barack Obama, presidential hopeful Joe Biden, Elon Musk, Jeff Bezos, Kim Kardashian and Apple, among others. The hack on the surface may appear to be a run-of-the-mill financial scam. But the breach has chilling implications for democracy. What happened is not about financial crime. It is a serious threat to us all.

  • Personal Data Can Easily Be Extracted from Zoom, Other Video Conference Screenshots

    Video conference users should not post screen images of Zoom and other video conference sessions on social media, according to BGU researchers, who easily identified people from public screenshots of video meetings on Zoom, Microsoft Teams and Google Meet.

  • Russian Government Hackers Trying to Steal COVID-19 Research Information from Western Labs

    Russian government hackers are targeting organizations involved in coronavirus vaccine development, U.K. security officials have revealed. The APT29 hacking group, also named “the Dukes” or “Cozy Bear,” is staffed by GRU (Russian military intelligence branch) hackers, and the GRU subcontracts Kremlin-ordered cyber operations to APT29. In 2016, the APT29 hackers stole emails from the Hillary Clinton campaign and the DNC

  • Germany Urges EU to Impose Cyber Sanctions on Russia for Bundestag Hacking

    The German government has made an official proposal to the European Union to impose sanctions on Russian individuals behind a broad hacking of the Bundestag five years ago. If the EU accepts the German proposal, it would be the first use of an EU cyber sanctions regime which was adopted by the organization in 2017, but which is yet to be used.

  • Securing the Smart Home

    So…you’ve built your smart home, it’s got smart heating and lighting, all the latest smart communications and entertainment systems, and of course, smart power generation to make it smart and green. But, how do you keep it secure and stop forced digital or physical entry? Well, you need smart security too, of course.

  • Privacy Risks of Home Security Cameras

    Researchers have used data from a major home Internet Protocol (IP) security camera provider to evaluate potential privacy risks for users. The researchers found that the traffic generated by the cameras could be monitored by attackers and used to predict when a house is occupied or not.

  • U.K. Will Not Be Able to Prevent “Misuse of Data” by China if Huawei Deal Goes Ahead: U.S. Ambassador

    Robert Wood Johnson, the U.S. ambassador to the U.K., warned that if the U.K. allowed Huawei access to the U.K. 5G communication infrastructure, there would be no way for the U.K. to prevent Chinese intelligence agencies from misusing the data collected by Huawei in the course of the company’s operations. Experts say that even more worryingly, if Huawei is allowed access to the nascent U.K. 5G infrastructure, the company, with a flip of a switch, could take down the entire U.K. communication system when ordered to do so by the Chinese government.

  • Cascading Security Through the Internet of Things Supply Chain

    The “internet of things” (IoT) has been insecure since the first connected refrigerator woke up and asked for more milk. But while having your fridge hacked seems at best amusing and at worst inconvenient, the nightmare scenario is a matter of national security. Imagine hundreds of thousands of smart refrigerators, all with the same default password, hacked to direct a flood of web traffic against key internet servers, paralyzing them. “Swap smart fridges for security cameras and DVD players, and you have the Dyn cyberattack of 2016,” Trey Herr, Nathaniel Kim, Bruce Schneier write.

  • Preventing Cyberbiosecurity Threats and Protecting Vulnerable Countries

    AI can automate the manipulation of medical datasets, expanding a cyberattack’s impact through health and biotech industries. Cyber- and biosecurity threats can erode trust in technology. Eroded trust in technology is dangerous at any time but especially during a global pandemic such as COVID-19.

  • Protecting Children's Online Privacy

    A University of Texas at Dallas study of 100 mobile apps for kids found that 72 violated a federal law aimed at protecting children’s online privacy. Researchers developed a tool that can determine whether an Android game or other mobile app complies with the federal Children’s Online Privacy Protection Act (COPPA).

  • Lawmaker Questions Intelligence Community Cybersecurity

    Following damning CIA report on stolen hacking tools — “the largest data loss in CIA history” — Sen. Ron Wyden (D-Oregon) asked Director of National Intelligence John Ratcliffe to explain what steps have been taken to improve the cybersecurity of some of the nation’s most sensitive secrets, held by federal intelligence agencies.

  • China-Backed Hackers Target Biden Campaign in Early Sign of 2020 Election Interference

    By Ping Zhang

    Google announced earlier this month that Chinese-backed hackers were observed targeting former Vice President Joe Biden’s campaign staff. Google said that hackers did not appear to compromise the campaign’s security, but the surveillance was a reminder of Russia’s interference in the 2016 election. 

  • Risks of—and Solutions for -- Remote Voting

    Delaware, West Virginia, and New Jersey have either deployed OmniBallot or plan to do so for fully online voting, also referred to as “electronic ballot return.” Other states including Colorado, Florida, Oregon, Ohio and Washington, the New York Times reports, use it to deliver blank ballots to registered voters who can mark them and return them by fax, email or mail. Election security researchers have found troubling vulnerabilities in OmniBallot.