-
German Engine Technology Used in Chinese Warships: Report
Engines developed in Germany can evade export control bans due to their status as a so-called dual-use technology, a German media investigation has revealed.
-
-
Protecting Infrastructure from Hackers
Two Midwestern universities lead an effort to form a coalition of regional research centers to work together to develop the region’s cyber defense talent with an eye to bolstering the defense of the region’s infrastructure against hackers.
-
-
U.S. Offers Reward for Information on Russian DarkSide Cybercrime Group
The United States has announced a reward of up to $10 million for information leading to the identification or location of any individual holding a “key leadership” position in DarkSide, a cybercrime group believed to be tied to Russia.The DarkSide syndicate was behind the attack on Colonial Pipeline – the largest publicly disclosed cyberattack against critical infrastructure in the United States.
-
-
Face Recognition Is So Toxic, Facebook Is Dumping It
Facebook’s decision to end its face-recognition program comes at a time when face recognition technology is receiving push back, criticisms, and legislative bans across the United States, and the globe.
-
-
Government Action Needed to Ensure Insurance Against Major Hacking of Driverless Vehicles: Experts
Government action is needed so driverless vehicles can be insured against malicious hacks which could have potentially catastrophic consequences, experts say. Traditional vehicle insurance wouldn’t cover the mass hacking of driverless cars, and an incident like this could cost the industry tens of billions of pounds.
-
-
U.S. Sanctions NSO Group, Israeli Maker of Pegasus Spyware
The U.S. authorities said the NSO Group’s spyware helped authoritarian governments “silence dissent.” The new measures will limit NSO Group’s access to U.S. components and technology.
-
-
The Ripple Factor: Weather Extremes Amplify Economic Losses
Weather extremes can cause economic ripples along our supply chains. A new study shows that if they occur at roughly the same time the ripples start interacting and can amplify even if they occur at completely different places around the world.
-
-
Hackers-for-Hire Drive Evolution of Threat Landscape
Cybersecurity threats are on the rise. The new edition of the ENISA Threat Landscape (ETL) highlights the surge in cybercriminality motivated by monetization using ransomware or cryptojacking. Supply-chains attacks also rank highly among prime threats because of the significant potential they have in inducing catastrophic cascading effects.
-
-
Targeted: Masterminds of Global Ransomware Attacks Against Critical Infrastructure
Twelve individuals who were wreaking havoc across the world with ransomware attacks against critical infrastructure have been targeted as the result of a law enforcement and judicial operation involving eight countries.
-
-
Warning Issued Over the Unintended Consequences of Wind for Achieving Net Zero Targets
In the run-up to the COP26 global climate summit in Glasgow, an expert on geoengineering and energy transition highlights the need for joined up thinking if the U.K. is going to find the optimal use of the North Sea to achieve Net Zero targets.
-
-
FCC Revokes China’s Telecom Rights to Operate in U.S.
The FCC on Tuesday revoked China’s Telecom rights to operate and provide services in the United States, and gave the company sixty days to terminate its operations. “Promoting national security is an integral part of the Commission’s responsibility to advance the public interest, and [Tuesday’s] action carries out that mission to safeguard the nation’s telecommunications infrastructure from potential security threats,” the FCC said.
-
-
U.S. Tightens Export Controls on Items Used in Surveillance of Private Citizens, other Malicious Cyber Activities
The Commerce Department has released an interim final rule, establishing controls on the export, reexport, or transfer (in-country) of certain items that can be used for surveillance of private citizens or other malicious cyber activities.
-
-
Piracy, Armed Robbery Incidents on the High Seas Decline, but Threats Remain
The first nine months of 2021 saw the lowest numbers of piracy and armed robbery incidents on the high seas since 1994. While the reduction of reported incidents is a welcome, the International Maritime Bureau warns that seafarers must remain vigilant as violence against crew remains high in many areas of the world.
-
-
Growing the U.S. AI Workforce
A new policy brief Georgetown University’s Center for Security and Emerging Technology (CSET) addresses the need for a clearly defined artificial intelligence education and workforce policy.
-
-
U.S. Leads Global Conference to Combat Ransomware Attacks
The White House is holding a two-day international conference starting Wednesday to combat ransomware computer attacks on business operations across the globe that cost companies, schools and health services an estimated $74 billion in damages last year.
-
More headlines
The long view
Economic Cyberespionage: A Persistent and Invisible Threat
Economic cyber-espionage, state-sponsored theft of sensitive business information via cyber means for commercial gain, is an invisible yet persistent threat to national economies.
Nuclear Has Changed. Will the U.S. Change with It?
Fueled by artificial intelligence, cloud service providers, and ambitious new climate regulations, U.S. demand for carbon-free electricity is on the rise. In response, analysts and lawmakers are taking a fresh look at a controversial energy source: nuclear power.
Calls Grow for U.S. to Counter Chinese Control, Influence in Western Ports
Experts say Washington should consider buying back some ports, offer incentives to allies to decouple from China.
Exploring the New Nuclear Energy Landscape
In the last few years, the U.S. has seen a resurgence of interest in nuclear energy and its potential for helping meet the nation’s growing demands for clean electricity and energy security. Meanwhile, nuclear energy technologies themselves have advanced, opening up new possibilities for their use.