-
Users Seek Out Echo Chambers on Social Media
Users are inclined to favor popular opinion; lack of exposure to dissent contributes to polarization.
-
-
Cybersecurity Education Varies Widely in U.S.
Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well trained to meet industry needs in a fast-changing field.
-
-
Truth and Reality with Chinese Characteristics
The Chinese Communist Party seeks to maintain total control over the information environment within China, while simultaneously working to extend its influence abroad to reshape the global information ecosystem. That includes not only controlling media and communications platforms outside China, but also ensuring that Chinese technologies and companies become the foundational layer for the future of information and data exchange worldwide.
-
-
Knocking Cloud Security Off Its Game
Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.
-
-
U.S. Sanctions on Iranian Hackers Highlight Growing Concern About the Islamic Republic’s Cyberwarriors
A feature of the simmering tensions between the US, Israel and Iran has been not just the tit-for-tat missile and drone strikes and assassinations, but accusations of cyberwarfare waged by Iran.
-
-
Computer Scientists Unveil Novel Attacks on Cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Intel and AMD issued security alerts based on the findings.
-
-
New Cybersecurity Center to Protect Grids Integrated with Renewables, Microgrids
Bringing renewable energy to the power grid raises all kinds of “internet-of-things” issues because “everything is connected,” says an expert. Solar inverters are connected to the internet. Wind farm controllers are connected to the internet. And with each internet connection, energy resources distributed across the countryside are potentially vulnerable to cyberattacks.
-
-
First Regional Cybersecurity Center to Protect the Nation’s Electricity Grid
U.S. Department of Energy awards $10 million grant to develop innovative solutions to mitigating cyber threats across the U.S. A new center will bring together experts from the private sector, academia and government to share information and generate innovative real-world solutions to protect the nation’s power grid and other key sectors.
-
-
Cybersecurity Researchers Spotlight a New Ransomware Threat – Be Careful Where You Upload Files
Today’s web browsers are much more powerful than earlier generations of browsers. Unfortunately, these capabilities also mean that hackers can find clever ways to abuse the browsers to trick you into letting ransomware lock up your files when you think that you’re simply doing your usual tasks online.
-
-
Banning TikTok Won’t Solve Social Media’s Foreign Influence, Teen Harm and Data Privacy Problems
Concerns about TikTok are not unfounded, but they are also not unique. Each threat posed by TikTok has also been posed by U.S.-based social media for over a decade. Lawmakers should take action to address harms caused by U.S. companies seeking profit as well as by foreign companies perpetrating espionage. Protecting Americans cannot be accomplished by banning a single app. To truly protect their constituents, lawmakers would need to enact broad, far-reaching regulation.
-
-
This Tiny Chip Can Safeguard User Data While Enabling Efficient Computing on a Smartphone
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
-
-
Chinese Government Poses 'Bold and Unrelenting' Threat to U.S. Critical Infrastructure: FBI
FBI Director Christopher Wray on 18 April warned that risks the government of China poses to U.S. national and economic security are “upon us now”—and that U.S. critical infrastructure is a prime target. He said that partnerships, joint operations, and private sector vigilance can help us fight back.
-
-
Spyware as Service: What the i-Soon Files Reveal About China’s Targeting of the Tibetan Diaspora
Governments are increasingly incorporating cyber operations into the arsenal of statecraft. This sophisticated integration combines open-source intelligence, geospatial intelligence, human intelligence, and cyber espionage with artificial intelligence, allowing for the gathering and analysis of ever-expanding data sets. Increasingly, such operations are being outsourced.
-
-
Israel’s Cybersecurity Market is Maturing, and Just in Time
As tensions around the world rise and cyber threats multiply like digital rabbits, the Israeli cyber scene’s maturation seems like a saving grace.
-
-
Exploring New Ideas for Countering Disinformation
The rise of social media has connected people to one another and to information more rapidly and directly than ever before, but this fast-moving digital information landscape has also turbocharged the spread of misinformation and disinformation. From COVID-19 to climate change, coordinated social media efforts to disseminate intentionally false or misleading information are sowing distrust in science and in public institutions, and causing real harms to individuals and society more broadly.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
By John Tucker
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.