-
Major Global Security Challenges
What are the major threats the world is facing? Researchers highlight five such threats: The growing role of disinformation; attacks on the idea of democracy; environmental challenges; economic instability; and terrorism – both domestic and foreign.
-
-
Mathematics Works in Serendipitous Ways
In the digital era and moving towards quantum computing, protecting data against hack attacks is one of our biggest challenges. Mathematical theorem used to crack U.S. government encryption algorithm.
-
-
Smart Inverters’ Vulnerability to Cyberattacks Needs to Be Identified and Countered
A survey of threats to microgrids from small power sources can help security experts develop solutions.
-
-
Consumers Feel Left Out of Debates on Cyberattacks and Data Security
Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.Illegal cyberattacks on thousands of citizens’ personal data in Australia have heightened awareness of the hazards of insecure digital systems, – and consumers want to play a more active role in building more resilient systems to reduce risks caused by hacking, online deception, bots and other threats.
-
-
Simple Hardware to Defend Against Microgrid Attacks
An inexpensive piece of hardware integrated with solar panel controllers can protect isolated power networks from cyberattacks.
-
-
Examining Vulnerabilities of Electric Vehicle Charging Infrastructure
With electric vehicles becoming more common, the risks and hazards of a cyberattack on electric vehicle charging equipment and systems also increases. Reviewing the vulnerabilities of EV charging infrastructure would help prioritize grid protections and informs policy makers.
-
-
The Human Side of Cybersecurity
We might think of cybersecurity as being mostly about firewalls, antivirus software, spam filters, and dDOS detection, but it is often social engineering and human failure that leads to breaches of computer systems and networks rather than sophisticated malware.
-
-
Smart Home Hubs Leave Users Vulnerable to Hackers
Machine learning programs mean even encrypted information can give cybercriminals insight into your daily habits.
-
-
Why Do Self-Driving Cars Crash?
As they traverse the air, land, or sea, encountering one another or other obstacles, these autonomous vehicles will need to talk to each other. Experts say we need to inject cybersecurity at every level of the autonomous vehicle networks of the future.
-
-
Cybercrime Insurance Is Making the Ransomware Problem Worse
Cybercrime insurance is making the ransomware problem worse During the COVID-19 pandemic, there was another outbreak in cyberspace: a digital epidemic driven by ransomware. Businesses are turning to cyberinsurance companies in desperation to protect themselves from attack. But the growth of the cyberinsurance market is only encouraging criminals to target companies that have extortion insurance.
-
-
Man Charged for Participation in LockBit Global Ransomware Campaign
A criminal complaint filed in the District of New Jersey was earlier this week, charging a dual Russian and Canadian national for his alleged participation in the LockBit global ransomware campaign.
-
-
No Evidence of Any Voting Machine Compromised: CISA
“We have seen no evidence that any voting system deleted or lost votes, changed votes, or was any way compromised in any race in the country”: CISA
-
-
Improving Security for Smart Systems
In an increasingly connected and smart world, sensors collect and share large amounts of data to help people make decisions. Researchers has recently developed a way to statistically analyze such complex sensor data, so that the computer algorithms that make data-based decisions can be more resilient and better able to cope with small errors.
-
-
U.S. Officials Hope Confidence Campaign Pays Off for Midterm Elections
“Americans should go to the ballot box with confidence,” Jen Easterly, the director of the Cybersecurity and Election Security Agency (CISA), told a cybersecurity forum late last month. Yet U.S. officials also acknowledge the threats to Tuesday’s elections are serious and are being treated with proper caution.
-
-
DHS Unveils New Cybersecurity Performance Goals for Critical Infrastructure
DHS released the Cybersecurity Performance Goals (CPGs), voluntary practices that outline the highest-priority baseline measures businesses and critical infrastructure owners of all sizes can take to protect themselves against cyber threats.
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.