• New brain-inspired cybersecurity system detects “bad apples” 100 times faster

    Cybersecurity is critical — for national security, corporations and private individuals. Sophisticated cybersecurity systems excel at finding “bad apples” in computer networks, but they lack the computing power to identify the threats directly. These limits make it easy for new species of “bad apples” to evade modern cybersecurity systems. And security analysts must sort the real dangers from false alarms. The Neuromorphic Cyber Microscope, designed by Lewis Rhodes Labs in partnership with Sandia National Laboratories, directly addresses this limitation. Due to its brain-inspired design, it can look for the complex patterns that indicate specific “bad apples,” all while using less electricity than a standard 60-watt light bulb.

  • Evaluating critical mineral-resource potential in Alaska

    A new method for evaluating the resource potential for large, underexplored regions for critical minerals in Alaska is now available online. Critical minerals are used in products that are vital to national security, technology, and also play an integral role in our everyday modern life.

  • The challenge of sustainable mineral supply

    An international team of researchers says global resource governance and sharing of geoscience data is needed to address challenges facing future mineral supply. Specifically of concern are a range of technology minerals, which are an essential ingredient in everything from laptops and cell phones to hybrid or electric cars to solar panels and copper wiring for homes. However, base metals like copper are also a matter of immense concern.

  • House, Senate committees approve agroterrorism bill

    The U.S. House of Representatives Homeland Security Committee and U.S. Senate Homeland Security and Governmental Affairs Committee passed the Securing our Agriculture and Food Act, clearing a key hurdle for the bill’s consideration by the full House and Senate. The Securing our Agriculture and Food Act requires the Secretary of Homeland Security (DHS), through the Assistant Secretary for Health Affairs, to lead the government’s efforts to secure the U.S. food, agriculture, and veterinary systems against terrorism and high-risk events.

  • YouTube users beware: Your viewing habits can be tracked

    Despite YouTube’s attempts to safeguard user anonymity, intelligence agencies, hackers, and online advertising companies can still determine which videos a user is watching. Researchers developed an algorithm to determine if someone had watched a specific video from a set of suspicious, terror-related videos. Intelligence agencies could access this technology for tracking terrorists or other suspicious individuals. Internet marketing companies could track the number and make-up of viewers watching an ad.

  • Vibrator maker to pay out $3 million for tracking users' sexual activity

    We-Vibe, the sex toy maker, has agreed to pay customers up to $7,600 each selling them a “smart vibrator” which tracked the customers’ sexual habits without their knowledge. A class-action lawsuit was filed against in an Illinois federal court against We-Vibe’s parent company, Standard Innovation. Standard Innovation has been ordered to pay a total of $3 million to owners of the vibrator who had also used the app associated with the vibrators (the tracking of customers was done by the app).

  • Making mobile transactions more secure with a quantum key system

    With the growing popularity of mobile phone apps to pay for purchases at cash registers and gas pumps, users would like to know their personal financial information is safe from cyber-attacks. For the first time, researchers have demonstrated a prototype device that can send unbreakable secret keys from a handheld device to a terminal. If integrated into a cell phone, for example, the device could allow secure links to near-field communications mobile payment systems and indoor Wi-Fi networks. It also could improve the security of ATMs and help prevent ATM skimming attacks, which are estimated to cost the industry more than $2 billion annually.

  • A First: U.S. brings hacking charges against two Russian government officials

    The United States, for the first time, has brought hacking charges against Russian government officials. The charges include hacking, wire fraud, trade secret theft and economic espionage. The Justice Department has previously charged Russians with cybercrime – and brought prosecutions against hackers sponsored by the Chinese and Iranian governments – but the new indictments are the first time a criminal case is being brought against Russian government officials.

  • ADL to build Silicon Valley center to monitor, fight cyberhate

    The Anti-Defamation League (ADL) has secured seed funding from Omidyar Network to build a state-of-the-art command center in Silicon Valley to combat the growing threat posed by hate online. The center will employ the best technology and seasoned experts to monitor, track, analyze, and mitigate hate speech and harassment across the Internet, in support of the Jewish community and other minority groups.

  • Cyberterrorism threat must be addressed: Pool Re’s chief

    Cyber is unlike any other peril, because of its theoretical ability to affect almost any insurance class. This significantly impairs (re)insurers’ ability to allocate capital, to model losses with confidence, and, as a result, to price insurance products accurately. The gap between the available global insurance capacity and market exposure has become increasingly stark: market capacity stands at approximately $500 million, but the exposure is estimated to be more than $130 billion. Pool Re, the U.K.’s $7.3 billion terrorism reinsurance fund, wants to extend its cover to include cyberattacks on property, chief executive Julian Enoizi said.

  • Misaligned incentives, executive overconfidence create advantages for cyberattackers

    New report outlines how cybercriminals have the advantage, thanks to the incentives for cybercrime creating a big business in a fluid and dynamic marketplace. Defenders on the other hand, often operate in bureaucratic hierarchies, making them hard-pressed to keep up. Attackers thrive in a fluid, decentralized market, while bureaucracy constrains defenders. Ninety-three percent of organizations surveyed have a cybersecurity strategy, but only 49 percent have fully implemented it. Nearly 60 percent of IT executives believe their cybersecurity strategy is fully implemented, while just over 30 percent of IT staff agree. Senior executives designing cyber strategies measure success differently than implementers.

  • Reusable sponge could revolutionize oil spill and diesel cleanup

    When the Deepwater Horizon drilling pipe blew out seven years ago, beginning the worst oil spill in U.S. history, those in charge of the recovery discovered a new wrinkle: the millions of gallons of oil bubbling from the sea floor weren’t all collecting on the surface where it could be skimmed or burned. Some of it was forming a plume and drifting through the ocean under the surface. Now, scientists have invented a new foam, called Oleo Sponge, that addresses this problem.

  • Ukrainian businessman with links to Trump, Russia dies in mysterious circumstances

    Alex Oronov, 69, a Ukranian-born millionaire businessman with ties to both Donald Trump and the Russian business elite, has died on 2 March in unexplained circumstances. Oronov, a naturalized American citizen, ran a large agricultural business in his native Ukraine. Oronov also had family ties to Michael Cohen, Donald Trump’s personal lawyer: Cohen’s brother, Bryan, was Oronov’s partner in an ethanol business in Ukraine. Oronov’s death is the latest in a series of mysterious deaths which have visited senior Russian diplomats in the past three months.

  • Up to $600 billion in American intellectual property stolen annually

    The theft of American intellectual property (IP) remains a systemic threat to the U.S. economy, inflicting an estimated cost that exceeds $225 billion in counterfeit goods, pirated software, and theft of trade secrets and could be as high as $600 billion annually. China remains the world’s principal IP infringer, driven by an industrial policy that continues to prioritize both acquisition and development of science and technology.

  • Serious security vulnerabilities found in home, business, industrial robots

    Researchers have identified numerous vulnerabilities in multiple home, business, and industrial robots available on the market today. The vulnerabilities identified included many graded as high or critical risk, leaving the robots susceptible to cyberattack. Once a vulnerability has been exploited, a hacker could potentially gain control of the robot for cyber espionage, turn a robot into an insider threat, use a robot to expose private information, or cause a robot to perform unwanted actions when interacting with people, business operations, or other robots. In the most extreme cases, robots could be used to cause serious physical damage and harm to people and property.