• Satellite observations help in earthquake monitoring, response

    Researchers have found that data gathered from orbiting satellites can provide more accurate information on the impact of large earthquakes, which, in turn, can help provide more effective emergency response.

  • Cyber protection technology moves from the lab to the marketplace

    MIT Lincoln Laboratory’s technique to protect commodity software from cyberattacks has transitioned to industry and will soon be available as part of a security suite.

  • Deepfake myths: Common misconceptions about synthetic media

    There is finally some momentum to “do something” about deepfakes, but crucial misconceptions about deepfakes and their effect on our society may complicate efforts to develop a strategic approach to mitigating their negative impacts.

  • With floods and droughts increasing, communities take a new look at storing water underground

    Groundwater recharging – that is, actively moving water underground, a practice known as managed aquifer recharge (MAR) — is the latest wave in water security. There are about 1,200 managed aquifer recharge projects in 62 countries. MAR can be used to restore depleted aquifers, rehabilitate ecosystems and cleanse polluted water. But there are challenges as well.

  • Lawmakers grapple with deepfake threat at hearing

    The House Intelligence Committee heard alarming testimony Thursday that deepfake videos could be weaponized by foreign adversaries to sow divisions in the United States. Olivia Beavers and Maggie Miller write in The Hill that Clint Watts, a former FBI special agent and senior fellow for Alliance for Securing Democracy at the German Marshall Fund, warned lawmakers that Russia and China will likely both work to develop “synthetic media capabilities” for use against the U.S. and other adversaries. “China’s artificial intelligence capabilities rival the U.S., are powered by enormous data troves to include vast amounts of information stolen from the U.S., and the country has already shown a propensity to employ synthetic media in television broadcast journalism,” he said.

  • Eliminating infamous security threats

    Meltdown and Spectre are speculative side-channel attacks exploit a fundamental functionality in microprocessors to expose security vulnerabilities. No efficient protection against such attacks has been found. Until now.

  • Hawk’s pursuit technique can help counter-drone defenses

    Hawks steer their pursuit of evasive prey using a feedback system that differs fundamentally from the missile-like interception system of falcons.

  • Dream of ideal “invisibility” cloaks for stress waves dashed

    Whether Harry Potter’s invisibility cloak, which perfectly steers light waves around objects to make them invisible, will ever become reality remains to be seen, but perfecting a more crucial cloak is impossible, a new study says. It would have perfectly steered stress waves in the ground, like those emanating from a blast, around objects like buildings to make them “untouchable.”

  • Finding and fixing natural gas leaks quickly, economically

    From production to consumption, natural gas leaks claim lives, damage the climate and waste money. Researchers are working on better ways to find and fix gas leaks quickly and inexpensively from one end of the system to the other.

  • Secure multiparty computation protecting privacy at the ballot box

    Shortly after the start of the new year, Americans around the nation will start returning to polling stations to vote in presidential primaries. How confident they feel in the voting process could depend on this thing called secure multiparty computation.

  • New computer attack mimics user's keystroke characteristics, evading detection

    Researchers have developed a new attack called “Malboard,” which evades several detection products that are intended to continuously verify the user’s identity based on personalized keystroke characteristics. 

  • Showing emergency responders the fastest, safest path to incident scenes

    Getting to your destination has never been easier, thanks to a number of popular global positioning systems (GPS) -based navigation apps available for download on smart devices. For first responders, there can be drawbacks to using the same apps and following the same routes as everyone else. When every second counts getting to an emergency scene, good enough just won’t cut it.

  • WhatsApp's loophole reveals role of private companies in cyber-surveillance

    Last month, WhatsApp’s latest security flaw was discovered, a flaw which allow governments to spy on dissidents, activists, and journalists. An Israeli cyber company is reportedly behind the loophole — and not for the first time.

  • ARCHANGEL: Securing national archives with AI and blockchain

    Researchers are using its state-of-the-art blockchain and artificial intelligence technologies to secure the digital government records of national archives across the globe – including the U.K., Australia, and the United States of America.

  • Silicon Valley’s scramble for China

    In August 2012, China launched one of its first major “smart city” projects for the remote oil town of Karamay in the autonomous province of Xinjiang. “Information technology is not just about technology. It should be integrated with all aspects of life in our city and make people’s lives more convenient,” said then Karamay Mayor Chen Xinfa. Nafeez Ahmed writes in Coda Story that A report released last year by subsidiary Deloitte China, titled “Super Smart City: Happier Society with Higher Quality,” celebrates China’s drive to build “super smart cities” which integrate data across services like health care, transport, education and public safety. Billed by Deloitte as a virtual utopia, China’s smart cities represent the biggest and most intrusive surveillance architecture ever built by any single nation, according to experts and analysts.