• Attacks against elections are inevitable – Estonia shows what can be done

    Kremlin-backed attackers are working to influence the upcoming European Parliament elections, according to cybersecurity firm FireEye. These new reports highlight rising fears of digital attacks on democracy around the world, including on the U.S. presidential elections in 2020. Russian interference in the West is not new. The experiences of Estonia – the first country ever victim to a clearly coordinated and politically motivated cyber operation – can inform American and European defenses to these complex threats.

  • Hackers can dupe radiologists, AI software

    Hackers can access a patient’s 3-D medical scans to add or remove malignant lung cancer, and deceive both radiologists and artificial intelligence algorithms used to aid diagnosis, according to a new study.

  • Supporting global companies against cyber threats

    A consortium of U.K. cyber security experts is to support global businesses to tackle online threats and protect themselves from cybercrime. The Cyber Readiness for Boards project has been launched to explore the factors shaping U.K. board decisions around cyber risk and develop interventions to provide guidance and support.

  • Bigger than Huawei: U.S. broadens scrutiny of Chinese technology

    A flurry of seemingly disconnected actions by the U.S. government to curb the involvement of Chinese technology firms in the U.S. economy over the past year reflects the Trump administration’s intensifying concern that those firms could — now or in the future — abet espionage by Beijing’s intelligence services.

  • AI automatically detects disturbances in power supply grids

    The grid is changing as the big, centralized providers of the past are replaced by smaller, distributed suppliers. Keeping such complex networks running stable requires high-resolution sensor technology – AI provides a way to make accurate predictions and automatically detect any disturbances or anomalies in real time.

  • Drones pose significant cyber, privacy challenges

    Growing drone use in populated areas poses significant risks that, without additional safeguards, could result in attacks by malicious entities and exploited for use in cyberattacks, terrorism, crime and invasion of privacy.

  • AG: Muller did not find that Trump’s campaign “conspired with the Russian government” 2016 election interference effort

    On Saturday afternoon, Attorney General William Barr sent Congress his “principal conclusions” of the Mueller report. Barr quotes the Mueller report to say that “[T]he investigation did not establish that members of the Trump Campaign conspired or coordinated with the Russian government in its election interference activities.” The Mueller report does not take a position on whether or not Trump engaged in obstruction of justice. Barr writes: “The Special Counsel… did not draw a conclusion — one way or the other — as to whether the examined conduct constituted obstruction.” The AG quotes the report to say that “while this report does not conclude that the President committed a crime, it also does not exonerate him.”

  • Mega European project on cybersecurity and data protection

    A new European Commission cyber project aims to set international standards in cybersecurity and boost the effectiveness of Europe’s security capacities.

  • Blocking digital gold diggers

    It is a phenomenon known to almost all of us: you browse the web and suddenly your computer slows down and runs loudly. This could be due to so-called crypto mining, meaning the access to computer power to generate cryptocurrencies without the knowledge of the user. New software, called “CoinEater,” blocks crypto mining.

  • Another Steel Dossier detail appears true

    On the final page of his 35-page dossier, former British intelligence officer Christopher Steele refers to a company, whose name is redacted, that allegedly was used to hack the Democratic party. Today, the New York Times identifies the company and its owner, Aleksej Gubarev, and says that according to a newly revealed report, the allegations against the Russian technology entrepreneur’s operations check out.

  • Russia attempted 2018 interference, gearing up to infiltrate election systems in 2020

    Defense Department and Homeland Security officials warn Russia did try to interfere in the 2018 election, and the United States is not prepared for what foreign adversaries likely will launch in 2020. One official told lawmakers on the House Appropriations Homeland Security Subcommittee that “what keeps him up at night” is thinking about the new ways adversaries will attempt to infiltrate US election systems in 2020.

  • Trapdoor found in SwissVote election system

    Researchers have examined the source code published as part of the SwissPost e-voting system, provided by Scytl, and discovered a cryptographic trapdoor. If exploited, researchers say this could allow insiders who ran or implemented the election system to modify votes undetected.

  • A new world for hackers: Acoustic side-channel attack

    During the DNA synthesis process in a laboratory, recordings can be made of the subtle, telltale noises made by synthesis machines. And those captured sounds can be used to reverse-engineer valuable, custom-designed genetic materials used in pharmaceuticals, agriculture and other bioengineering fields.

  • Deterrence in the cyber age: U.K. Foreign Secretary's speech

    U.K. foreign secretary Jeremy Hunt last Thursday spoke at Glasgow University on cybersecurity and the U.K. government’s approach to deterring cybercrime. “In the cyber age, an authoritarian regime armed with nothing more ambitious than a laptop computer could try to manipulate our democracy, Hunt said. “For every example of publicly attributed interference [by Russia], there have been others that never saw the light of day.” He added: “The material fact is that the Russian state has tried to subvert democracy,” concluding: “We can no longer afford to wait until an authoritarian regime demonstrably succeeds in changing the outcome of an election and weakening trust in the integrity of democracy itself. The risk is that after just a few cases, a pall of suspicion would descend over a democratic process – and once that happens, the damage would be difficult, perhaps impossible, to repair.”

  • Securing the “internet of things” in the quantum age

    Quantum computers can in principle execute calculations that today are practically impossible for classical computers. Bringing quantum computers online and to market could one day enable advances in medical research, drug discovery, and other applications. But there’s a catch: If hackers also have access to quantum computers, they could potentially break through the powerful encryption schemes that currently protect data exchanged between devices.