• Supporting global companies against cyber threats

    A consortium of U.K. cyber security experts is to support global businesses to tackle online threats and protect themselves from cybercrime. The Cyber Readiness for Boards project has been launched to explore the factors shaping U.K. board decisions around cyber risk and develop interventions to provide guidance and support.

  • Bigger than Huawei: U.S. broadens scrutiny of Chinese technology

    A flurry of seemingly disconnected actions by the U.S. government to curb the involvement of Chinese technology firms in the U.S. economy over the past year reflects the Trump administration’s intensifying concern that those firms could — now or in the future — abet espionage by Beijing’s intelligence services.

  • AI automatically detects disturbances in power supply grids

    The grid is changing as the big, centralized providers of the past are replaced by smaller, distributed suppliers. Keeping such complex networks running stable requires high-resolution sensor technology – AI provides a way to make accurate predictions and automatically detect any disturbances or anomalies in real time.

  • Drones pose significant cyber, privacy challenges

    Growing drone use in populated areas poses significant risks that, without additional safeguards, could result in attacks by malicious entities and exploited for use in cyberattacks, terrorism, crime and invasion of privacy.

  • AG: Muller did not find that Trump’s campaign “conspired with the Russian government” 2016 election interference effort

    On Saturday afternoon, Attorney General William Barr sent Congress his “principal conclusions” of the Mueller report. Barr quotes the Mueller report to say that “[T]he investigation did not establish that members of the Trump Campaign conspired or coordinated with the Russian government in its election interference activities.” The Mueller report does not take a position on whether or not Trump engaged in obstruction of justice. Barr writes: “The Special Counsel… did not draw a conclusion — one way or the other — as to whether the examined conduct constituted obstruction.” The AG quotes the report to say that “while this report does not conclude that the President committed a crime, it also does not exonerate him.”

  • Mega European project on cybersecurity and data protection

    A new European Commission cyber project aims to set international standards in cybersecurity and boost the effectiveness of Europe’s security capacities.

  • Blocking digital gold diggers

    It is a phenomenon known to almost all of us: you browse the web and suddenly your computer slows down and runs loudly. This could be due to so-called crypto mining, meaning the access to computer power to generate cryptocurrencies without the knowledge of the user. New software, called “CoinEater,” blocks crypto mining.

  • Another Steel Dossier detail appears true

    On the final page of his 35-page dossier, former British intelligence officer Christopher Steele refers to a company, whose name is redacted, that allegedly was used to hack the Democratic party. Today, the New York Times identifies the company and its owner, Aleksej Gubarev, and says that according to a newly revealed report, the allegations against the Russian technology entrepreneur’s operations check out.

  • Russia attempted 2018 interference, gearing up to infiltrate election systems in 2020

    Defense Department and Homeland Security officials warn Russia did try to interfere in the 2018 election, and the United States is not prepared for what foreign adversaries likely will launch in 2020. One official told lawmakers on the House Appropriations Homeland Security Subcommittee that “what keeps him up at night” is thinking about the new ways adversaries will attempt to infiltrate US election systems in 2020.

  • Trapdoor found in SwissVote election system

    Researchers have examined the source code published as part of the SwissPost e-voting system, provided by Scytl, and discovered a cryptographic trapdoor. If exploited, researchers say this could allow insiders who ran or implemented the election system to modify votes undetected.

  • A new world for hackers: Acoustic side-channel attack

    During the DNA synthesis process in a laboratory, recordings can be made of the subtle, telltale noises made by synthesis machines. And those captured sounds can be used to reverse-engineer valuable, custom-designed genetic materials used in pharmaceuticals, agriculture and other bioengineering fields.

  • Deterrence in the cyber age: U.K. Foreign Secretary's speech

    U.K. foreign secretary Jeremy Hunt last Thursday spoke at Glasgow University on cybersecurity and the U.K. government’s approach to deterring cybercrime. “In the cyber age, an authoritarian regime armed with nothing more ambitious than a laptop computer could try to manipulate our democracy, Hunt said. “For every example of publicly attributed interference [by Russia], there have been others that never saw the light of day.” He added: “The material fact is that the Russian state has tried to subvert democracy,” concluding: “We can no longer afford to wait until an authoritarian regime demonstrably succeeds in changing the outcome of an election and weakening trust in the integrity of democracy itself. The risk is that after just a few cases, a pall of suspicion would descend over a democratic process – and once that happens, the damage would be difficult, perhaps impossible, to repair.”

  • Securing the “internet of things” in the quantum age

    Quantum computers can in principle execute calculations that today are practically impossible for classical computers. Bringing quantum computers online and to market could one day enable advances in medical research, drug discovery, and other applications. But there’s a catch: If hackers also have access to quantum computers, they could potentially break through the powerful encryption schemes that currently protect data exchanged between devices.

  • Flaws in 4G, 5G networks could allow hackers intercept calls, track location

    Newly discovered vulnerabilities in 4G and 5G networks could be used to intercept phone calls and track users’ locations, according to researchers. Not only has 5G promised to be faster than previous generations, but it should also be more secure. That such serious vulnerabilities have been found in the new networks is hardly reassuring, as the 5G standard was specifically developed to better protect against these kind of attacks.

  • Protect confidential information from cyberattacks

    The NSF is funding research aiming to develop new guidelines for sharing secret information through wireless communication that would improve security for users and minimizes cost.