-
TRUTH DECAYWhy Are Older Adults More Likely to Share Misinformation Online?
Older adults tend to do well at identifying falsehoods in experiments, but they’re also likelier than younger adults to like and share misinformation online. Older adults have greater tendency to seek out, believe material that conforms to pre-existing views, expert says.
-
-
TRUTH DECAYEmpowering Users to Discern Fact from Fiction in the Age of AI
A new project will investigate interventions that enable individuals to effectively harness AI while building the literacy needed to avoid scams and other forms of abuse.
-
-
AI & CYBER DEFENSESGenerative AI Speeds up Cybersecurity Defenses
Faster adversary emulation helps defenders stop cyberattacks: Scientists are using generative AI to accelerate a key step in the defense against cyberattacks, performing complex operations in minutes instead of weeks.
-
-
SECURITY TECHNOLOGYEntity Resolution: The Security Technology You Probably Haven’t Heard Of
The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.
-
-
NUCLEAR SAFETYProtecting Next-Gen Reactors
As the United States accelerates deployment of advanced and small modular reactors (A/SMRs), the nuclear energy sector is embracing a digital future. While digital systems provide operators with big benefits, they can also create vulnerabilities that enable criminals to access critical infrastructure.
-
-
EXTREMISMFar-Right Extremists Have Been Organizing Online Since Before the Internet – and AI Is Their Next Frontier
How can society police the global spread of online far-right extremism while still protecting free speech? Far-right extremists have long pioneered innovative ways to exploit technological progress and free speech. Efforts to counter this radicalization are challenged to stay one step ahead of the far right’s technological advances.
-
-
AI RISKS: UNSETTLING DEMONSTRATION AI-enabled Intrusions: What Anthropic’s Disclosure Really Means
Last week, AI company Anthropic reported with ‘high confidence’ that a Chinese state-sponsored hacking group had weaponized Anthropic’s own AI tools to run a largely automated cyberattack on several technology firms and government agencies. The September operation is the first publicly known case of an AI system conducting target reconnaissance with only minimal human direction.
-
-
DEMOCRACY WATCHFake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
-
-
CYBER RESILIENCEShared Risks, Shared Advantage: Collaborating for Collective Cyber Resilience
The same connectivity that powers our prosperity, and which has driven innovation and growth, has also created shared vulnerabilities and structural fragilities. We are increasingly seeing how a single weak link, often in a third-party provider, can cascade across industries, economies and borders.
-
-
AIResearchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI
Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.
-
-
TECH SECURITYBuilding Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
-
-
CHINA WATCHU.S.–China Cyber Relations and the Weaponization of Microsoft Platforms
Cyber tensions between the United States and China show Microsoft’s central yet fragile role in global cybersecurity, where its platforms serve as both assets and targets. While both nations have exploited vulnerabilities within the platform to conduct cyber-espionage against each other, China has been particularly persistent in its operations.
-
-
CYBERSECURITYStudy Finds Smarter Way to Train Employees to Thwart Phishing Scams
Companies often send out simulated—or fake—phishing emails to employees to see who takes the bait and click. Those who fall for such scams typically receive an on-the-spot lesson meant to help them recognize suspicious messages the next time. But new research finds that approach might not be the best way to help employees learn from their mistakes.
-
-
CRITICAL INFRASTRUCTUREThe Invisible Siege: Securing the Indo-Pacific’s Telecom Backbone
Telecommunications once seemed like the passive layer of critical infrastructure—pipes and switches that connected everything yet rarely drew attention. That perception ended long ago. The stability of countries will depend on whether they can keep the lights on and the lines open when pressure comes.
-
-
EXTREMISMPolitical Violence Offers Extremist “Trigger Events” for Recruiting Supporters
Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.
-
More headlines
The long view
EXTREMISMPolitical Violence Offers Extremist “Trigger Events” for Recruiting Supporters
Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.
DEMOCRACY WATCHFake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
TECH SECURITYBuilding Trust into Tech: A Framework for Sovereign Resilience
By Jason Van der Schyff and James Corera
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
AIResearchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI
By Matt Shipman
Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.
