• CYBERSECURITYFormer U.S. Cyber Command and NSA Chief Makes the Case for a Cyber Competition Strategy

    By Bec Shrimpton

    Former U.S. National Security Agency and U.S. Cyber Command boss Mike Rogers asks: “What is our vision of the key technologies, the most critical sectors that are really going to drive economic advantage … and [that] if placed at risk would cause us harm, [and] what are the policies we need to create advantage for ourselves?” A new cybersecurity strategy based on what is required to become and remain competitive, secure and resilient should focus on this central question.

  • CYBERSECURITYThinking Like a Cyber-Attacker to Protect User Data

    By Adam Zewe

    Researchers found that an understudied component of computer processors is susceptible to attacks from malicious agents. Then, they developed mitigation mechanisms.

  • FOOD SECURITYRise of Precision Agriculture Exposes Food System to New Threats

    By George Grispos and Austin C. Doctor

    Farmers are adopting precision agriculture, using data collected by GPS, satellite imagery, internet-connected sensors and other technologies to farm more efficiently. These practices could help increase crop yields and reduce costs, but the technology behind the practices is creating opportunities for extremists, terrorists and adversarial governments to attack farming machinery, with the aim of disrupting food production.

  • CYBERSECURITYNSF Grants to Protect Data, User privacy

    Researchers are working on two new cybersecurity projects, recently funded by the National Science Foundation, to ensure trustworthy cloud computing and increase computing privacy for marginalized and vulnerable populations.

  • AIArtificial Intelligence Isn’t That Intelligent

    By Harriet Farlow

    In the world of information security, social engineering is the game of manipulating people into divulging information that can be used in a cyberattack or scam. Cyber experts may therefore be excused for assuming that AI might display some human-like level of intelligence that makes it difficult to hack. Unfortunately, it’s not. It’s actually very easy.

  • SURVEILLANCEHow Daycare Apps Can Spy on Parents and Children

    Daycare apps are designed to make everyday life in daycare centers easier. Parents can use them, for example, to access reports on their children’s development and to communicate with teachers. However, some of these applications have serious security flaws.

  • CYBERSECURITYWhen the Hardware Traps Criminals

    Up to now, protecting hardware against manipulation has been a laborious business: expensive, and only possible on a small scale. And yet, two simple antennas might do the trick.

  • ENCRYPTIONA Key Role for Quantum Entanglement

    A method known as quantum key distribution has long held the promise of communication security unattainable in conventional cryptography. An international team of scientists, including ETH physicists, has now demonstrated experimentally, for the first time, an approach to quantum key distribution that uses high-quality quantum entanglement to provide much broader security guarantees than previous schemes.

  • ARGUMENT: SECURING ENCRYPTIONHack Post-Quantum Cryptography Now So That Bad Actors Don’t Do It Later

    In February, the cryptography community was stunned when a researcher claimed that an algorithm that might become a cornerstone of the next generation of internet encryption can be cracked mathematically using a single laptop. Edward Parker and Michael Vermeer write that this finding may have averted a massive cybersecurity vulnerability, but it also raises concerns that new encryption methods for securing internet traffic contain other flaws that have not yet been detected.

  • CRYPTOGRAPHYSecure Cryptography with Real-World Devices Is Now Possible

    New research published in Nature explains how an international team of researchers have, for the first time, experimentally implemented a type of quantum cryptography considered to be the ‘ultimate’, ‘bug-proof’ means of communication.

  • CHINA WATCHChina Tried to Infiltrate Federal Reserve: Senate Report

    By Rob Garver

    Fed Chair Jerome Powell and a senior member of Congress are at odds over a report issued Tuesday by Senate Republicans alleging that China is trying to infiltrate the Federal Reserve and that the central bank has done too little to stop it. China’s goal, according to the report, is to “supplant the U.S. as the global economic leader and end the U.S. dollar’s status as the world’s primary reserve currency.”

  • CYBERSECURITY EDUCATIONNew Chief Information Officer (CIO) Program at NYU

    Created in partnership with Emeritus, the new nine-month executive program helps senior technology leaders and CIOs advance their C-suite leadership skills, transform information systems, and navigate rapidly changing remote and workforce trends.

  • EXTREMISMThere Is a Lot of Antisemitic Hate Speech on Social Media – and Algorithms Are Partly to Blame

    By Sabine von Mering and Monika Hübscher

    Antisemitic incidents have shown a sharp rise in the United States. There were 2,717 incidents in 2021. This represents an increase of 34% over 2020. In Europe, the European Commission found a sevenfold increase in antisemitic postings across French language accounts, and an over thirteenfold increase in antisemitic comments within German channels during the pandemic. Contemporary antisemitism manifests itself in various forms such as GIFs, memes, vlogs, comments and reactions such as likes and dislikes on the platforms. The continuous exposure to antisemitic content at a young age, scholars say, can lead to both normalization of the content and radicalization of the Tik-Tok viewer.

  • TRUTH DECAYYour Brain Is Better Than You at Busting Deepfakes

    Deepfake videos, images, audio, or text appear to be authentic, but in fact are computer generated clones designed to mislead you and sway public opinion. They are the new foot soldiers in the spread of disinformation and are rife – they appear in political, cybersecurity, counterfeiting, and border control realms. While observers can’t consciously recognize the difference between real and fake faces, their brains can.

  • CYBERSECURITY EDUCATIONFAU Receives State Grant for Cybersecurity, IT Training

    Cybersecurity jobs are expected to grow by a faster-than-average 33 percent over the next 10 years. In addition, cybersecurity-related job postings have increased by 43 percent in the past year. Florida launches a $15.6 million initiative to prepare students and mid-career professionals for jobs in the fields of cybersecurity and information technology.