• U.K. airports, nuclear power stations on terror alert following “credible” threat

    Airports and nuclear power stations in the United Kingdom have been instructed to bolster their defenses against terrorist attacks in the face of intensified threats to electronic security systems. Security services have issued a series of alerts over the weekend, warning that terrorists may have developed ways of bypassing safety checks. U.S. and British security services are concerned that terrorists will use the techniques they developed to bypass screening devices at European and U.S. airports, against other critical infrastructure facilities such as nuclear power stations.

  • Hackers can hijack scanners to perpetrate cyberattacks

    A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to researchers. The researchers conducted several demonstrations to transmit a message into computers connected to a flatbed scanner. Using direct laser light sources up to a half-mile (900 meters) away, as well as on a drone outside their office building, the researchers successfully sent a message to trigger malware through the scanner.

  • Repealing FCC’s privacy rules: A serious blow to privacy, cybersecurity

    In the end, the cybersecurity implications of repealing the FCC’s privacy rules come from simple logic. If the privacy rules are repealed, Internet providers will resume and accelerate these dangerous practices with the aim of monetizing their customers’ browsing history and app usage. But in order to do that, Internet providers will need to record and store even more sensitive data on their customers, which will become a target for hackers. Internet providers will also be incentivized to break their customers’ security, so they can see all the valuable encrypted data their customers send. And when Internet providers break their customers’ security, you can be sure malicious hackers will be right on their heels. The net result is simple: repealing the FCC’s privacy rules won’t just be a disaster for Americans’ privacy. It will be a disaster for America’s cybersecurity, too.

  • Russia's interference in U.S. presidential election “an act of war”: Dick Cheney

    Former Vice President Dick Cheney said Russia’s interference in the 2016 U.S. presidential election could be considered “an act of war.” Cheney said there was “no question” that Vladimir Putin had attempted to influence the election outcome. “There’s no question there was a very serious effort made by Putin and his government, his organization, to interfere in major ways with our basic fundamental democratic processes,” Cheney said during a speech at a business conference in New Delhi, India.

  • Connected dolls, tell-tale teddy bears: Managing the Internet of Toys

    Large numbers of connected toys have been put on the market over the past few years, and the turnover is expected to reach €10 billion by 2020 – up from just €2.6 billion in 2015. Connected toys come in many different forms, from smart watches to teddy bears that interact with their users. They are connected to the internet and together with other connected appliances they form the Internet of Things, which is bringing technology into our daily lives more than ever. However, the toys’ ability to record, store and share information about their young users raises concerns about children’s safety, privacy and social development. Action is thus needed to monitor and control the emerging Internet of Toys.

  • Protecting web users’ privacy

    Most website visits these days entail a database query — to look up airline flights, for example, or to find the fastest driving route between two addresses. But online database queries can reveal a surprising amount of information about the people making them. And some travel sites have been known to jack up the prices on flights whose routes are drawing an unusually high volume of queries. MIT researchers next week will present a new encryption system that disguises users’ database queries so that they reveal no private information.

  • New brain-inspired cybersecurity system detects “bad apples” 100 times faster

    Cybersecurity is critical — for national security, corporations and private individuals. Sophisticated cybersecurity systems excel at finding “bad apples” in computer networks, but they lack the computing power to identify the threats directly. These limits make it easy for new species of “bad apples” to evade modern cybersecurity systems. And security analysts must sort the real dangers from false alarms. The Neuromorphic Cyber Microscope, designed by Lewis Rhodes Labs in partnership with Sandia National Laboratories, directly addresses this limitation. Due to its brain-inspired design, it can look for the complex patterns that indicate specific “bad apples,” all while using less electricity than a standard 60-watt light bulb.

  • Early warning system for DDoS cyberattacks

    Researchers have developed a kind of early warning system for mass cyberattacks. These mass cyberattacks, known as Distributed Denial of Service (DDoS) attacks, are considered to be one of the scourges of the Internet. Because they are relatively easy to conduct, they are used by teenagers for digital power games, by criminals as a service for the cyber mafia, or by governments as a digital weapon.

  • Sonic cyberattacks expose security holes in ubiquitous sensors

    Sound waves could be used to hack into critical sensors used in broad array of technologies including smartphones, automobiles, medical devices and the Internet of Things. The inertial sensors involved in this research are known as capacitive MEMS accelerometers. They measure the rate of change in an object’s speed in three dimensions. Embedded into the circuits of airplanes, cars, trucks, medical devices, smartphones, and even emerging satellites, they gather information from the outside world and pass it on to decision-making components on the fly. Accelerometers help airplanes navigate, tell auto safety systems when to deploy and keep your smartphone screen properly oriented, to name just a few of their jobs.

  • Making mobile transactions more secure with a quantum key system

    With the growing popularity of mobile phone apps to pay for purchases at cash registers and gas pumps, users would like to know their personal financial information is safe from cyber-attacks. For the first time, researchers have demonstrated a prototype device that can send unbreakable secret keys from a handheld device to a terminal. If integrated into a cell phone, for example, the device could allow secure links to near-field communications mobile payment systems and indoor Wi-Fi networks. It also could improve the security of ATMs and help prevent ATM skimming attacks, which are estimated to cost the industry more than $2 billion annually.

  • Examining susceptibility to cyberattacks through brain activity, eye gaze

    New research examines internet users’ susceptibility and ability to detect cybercriminal attacks by analyzing a user’s brain activity and eye gaze while they are performing security related tasks. “Keeping computer systems and networks secure often relies upon the decisions and actions of those using the system,” one researcher says. “Therefore, it is vital to understand users’ performance and behavior when an attack such as phishing or malware occurs. The analysis of neural activations depicts the users’ decision-making capacities, attention and comprehension of the security tasks.”

  • A First: U.S. brings hacking charges against two Russian government officials

    The United States, for the first time, has brought hacking charges against Russian government officials. The charges include hacking, wire fraud, trade secret theft and economic espionage. The Justice Department has previously charged Russians with cybercrime – and brought prosecutions against hackers sponsored by the Chinese and Iranian governments – but the new indictments are the first time a criminal case is being brought against Russian government officials.

  • Russian interventions in other people’s elections: A brief history

    In the last nine years, Russia has invaded its neighbor Georgia, annexed the Ukrainian province of Crimea, supported rebels in Eastern Ukraine, interfered in the U.S. presidential election, and more. Are these actions a sign that Russia is returning to aggressive foreign policies or are they part of an entirely new direction in Russian foreign policy? The answer to this question is important for the U.S. and countries throughout the world. If these policies are a return to deep Russian tradition, it will be difficult to reverse Russian aggression.

  • Protecting internet video and pictures from cyberattacks

    Recently Wikileaks-published CIA documents focused on hacking smart devices, but attacks on internet video pose a much greater threat – and internet video will comprise 82 percent of all global consumer internet traffic by 2020. A Ben-Gurion University of the Negev (BGU) researcher has developed a new technique that could provide virtually 100 percent protection against cyberattacks launched through internet videos or images.

  • Cyberterrorism threat must be addressed: Pool Re’s chief

    Cyber is unlike any other peril, because of its theoretical ability to affect almost any insurance class. This significantly impairs (re)insurers’ ability to allocate capital, to model losses with confidence, and, as a result, to price insurance products accurately. The gap between the available global insurance capacity and market exposure has become increasingly stark: market capacity stands at approximately $500 million, but the exposure is estimated to be more than $130 billion. Pool Re, the U.K.’s $7.3 billion terrorism reinsurance fund, wants to extend its cover to include cyberattacks on property, chief executive Julian Enoizi said.