-
Deterrence in the cyber age: U.K. Foreign Secretary's speech
U.K. foreign secretary Jeremy Hunt last Thursday spoke at Glasgow University on cybersecurity and the U.K. government’s approach to deterring cybercrime. “In the cyber age, an authoritarian regime armed with nothing more ambitious than a laptop computer could try to manipulate our democracy, Hunt said. “For every example of publicly attributed interference [by Russia], there have been others that never saw the light of day.” He added: “The material fact is that the Russian state has tried to subvert democracy,” concluding: “We can no longer afford to wait until an authoritarian regime demonstrably succeeds in changing the outcome of an election and weakening trust in the integrity of democracy itself. The risk is that after just a few cases, a pall of suspicion would descend over a democratic process – and once that happens, the damage would be difficult, perhaps impossible, to repair.”
-
-
Securing the “internet of things” in the quantum age
Quantum computers can in principle execute calculations that today are practically impossible for classical computers. Bringing quantum computers online and to market could one day enable advances in medical research, drug discovery, and other applications. But there’s a catch: If hackers also have access to quantum computers, they could potentially break through the powerful encryption schemes that currently protect data exchanged between devices.
-
-
Flaws in 4G, 5G networks could allow hackers intercept calls, track location
Newly discovered vulnerabilities in 4G and 5G networks could be used to intercept phone calls and track users’ locations, according to researchers. Not only has 5G promised to be faster than previous generations, but it should also be more secure. That such serious vulnerabilities have been found in the new networks is hardly reassuring, as the 5G standard was specifically developed to better protect against these kind of attacks.
-
-
Protect confidential information from cyberattacks
The NSF is funding research aiming to develop new guidelines for sharing secret information through wireless communication that would improve security for users and minimizes cost.
-
-
Secure information exchange: Quantum communication over fiber-optic networks
Searching for better security during data transmission, governments and other organizations around the world have been investing in and developing technologies related to quantum communication and related encryption methods. Researchers are looking at how these new systems—which, in theory, would provide unhackable communication channels—can be integrated into existing and future fiber-optic networks.
-
-
U.S. Cyber Command cut Russian troll factory’s access to the internet
The U.S. Cyber Command blocked the internet access of the St. Petersburg’s-based Internet Research Agency (IRA), a Russian disinformation and propaganda outfit which was contracted by the Kremlin to orchestrate the social media disinformation campaign to help Donald Trump win the 2016 presidential election. The IRA’s access to the internet was blocked on midterms Election Day, and for a few days following the election.
-
-
Most laptops vulnerable to attacks via peripheral devices
Many modern laptops and an increasing number of desktop computers are much more vulnerable to hacking through common plug-in devices than previously thought, according to new research. The research shows that attackers can compromise an unattended machine in a matter of seconds through devices such as chargers and docking stations.
-
-
Top password managers have fundamental flaws
Top password managers have fundamental flaws that expose user credentials in computer memory while locked, according to new research. Sixty Million users and 93,000 businesses worldwide rely on 1Password, Dashlane, KeePass, and LastPass to protect data.
-
-
Expanding cybersecurity education to fill job market shortfall
Experts say that the U.S. cyber workforce shortfall is growing. By the 2022, the shortage of cybersecurity professionals is predicted to be 1.8 million. Colleges and universities expand their cybersecurity education offerings.
-
-
Next-generation grid security tech
Researchers will demonstrate the effectiveness of metro-scale quantum key distribution (QKD) as a means of secure communication for the nation’s electricity suppliers. This initial milestone is part of the team’s three-year project focused on next-generation grid security.
-
-
How far should organizations be able to go to defend against cyberattacks?
Organizations can and should be encouraged to take passive defense measures, like gathering intelligence on potential attackers and reporting intrusions. But in my view they should be discouraged – if not prevented – from acting aggressively, because of the risk of destabilizing corporate and international relations. If the quest for cyber peace degenerates into a tit-for-tat battle of digital vigilantism, global insecurity will be greater, not less.
-
-
Artificial Intelligence to make life harder for hackers
As the volume of digital information in corporate networks continues to grow, so grows the number of cyberattacks, and their cost. One cybersecurity vendor, Juniper Networks, estimates that the cost of data breaches worldwide will reach $2.1 trillion in 2019, roughly four times the cost of breaches in 2015. Now, computer scientists have developed a tool that could make it harder for hackers to find their way into networks where they don’t belong.
-
-
Is your VPN secure?
About a quarter of internet users use a virtual private network, a software setup that creates a secure, encrypted data connection between their own computer and another one elsewhere on the internet. Many people use them to protect their privacy when using Wi-Fi hotspots, or to connect securely to workplace networks while traveling. Other users are concerned about surveillance from governments and internet providers. However, most people – including VPN customers – don’t have the skills to double-check that they’re getting what they paid for. A group of researchers I was part of do have those skills, and our examination of the services provided by 200 VPN companies found that many of them mislead customers about key aspects of their user protections.
-
-
Improving security for Internet of Things with “big-thinking” research
Every day, more and more people interact with the Internet of Things (IoT) in daily life. The IoT includes the devices and appliances in our homes — such as smart TVs, virtual assistants like Amazon’s Alexa or learning thermostats like Nest — that connect to the internet. The IoT also includes wearables such as the Apple Watch or Bluetooth chips that keep track of car keys. Our cars themselves, if equipped with sensors and computers, are also part of the IoT. In an age where data theft and cyberattacks are increasingly routine, the IoT has security vulnerabilities that must be addressed as the popularity of IoT devices grows.
-
-
Review of the “Digitization of WMD” symposium
The digitization of biological and medical science is providing exciting and promising new pathways for improving health and daily life for mankind and our environment. The possibilities for new treatments, better fitness, and less prevalence of genetic diseases are numerous. However, these technologies and the information associated with emerging techniques carry certain risks and vulnerabilities. It is through understanding these risks and continuing to develop mitigation strategies for them, especially during the technology conceptualization and development phases, that we can continue to build promising new tools to improve life with confidence while addressing how they should be properly used.
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.