-
New Vulnerability Found in Internet-Connected Building Automation Devices
Critical internet-connected smart building devices used in countless commercial and industrial properties, have been found to be vulnerable to a new malicious attack. The vulnerability exploits the properties in the building automation protocol (Bacnet) which enables technicians and engineers performing monitoring, setup changes and remote control of a wide range of key smart systems that impact temperature control, and other monitoring systems.
-
-
How Does Online Racism Spawn Mass Shooters?
More and more experts classify mass shootings inspired by white nationalist ideology as terrorism — part of a global white nationalist movement that recruits or inspires potential shooters. The mechanisms of recruiting white nationalist terrorists work much as with other terrorist groups such as the Islamic State; they take lonely young men and give them a sense of purpose and identity. But instead of the alternative society offered by Islamic State membership, violent and racist online platforms build toward single murderous events. The language used on the forums to encourage potential shooters combines nihilism and toxic masculinity, goading them with anti-gay slurs and challenging them as “wannabes” if they fail.
-
-
U.S. Elections Are Still Not Safe from Attack
Russia’s attack on American elections in 2016, described in Special Counsel Robert Mueller’s recent report as “sweeping and systematic,” came as a shock to many. It shouldn’t have. Experts had been warning of the danger of foreign meddling in U.S. elections for years. Already by 2016, the wholesale adoption of computerized voting had weakened safeguards against interference and left the United States vulnerable to an attack. So, too, the shift to digital media and communications had opened new gaps in security and the law that could be used for manipulation and blackmail.
-
-
Who Leads the U.S. “War” on Disinformation?
When former U.S. Special Counsel Robert Mueller testified before the House Intelligence Committee last week about his investigation into Russian interference in the 2016 presidential election, some saw his comments about Moscow’s ongoing meddling attempts as the most important statement of the day. “It wasn’t a single attempt,” he said when asked about the spread of disinformation and whether Moscow would replicate the efforts again. “They’re doing it as we sit here and they expect to do it during the next campaign.” It’s not clear, however, who can or will lead the charge in this “war on disinformation.” Even as experts say the problem is worsening, it is unlikely that the current divided government could produce anything close to a solution.
-
-
Hacking One of the World's Most Secure Industrial Programmable Logic Controllers (PLC)
Researchers have managed to take control of a Siemens PLC, which is considered to be one of the safest controllers in the world. As part of the attack, the researchers analyzed and identified the code elements of the Siemens proprietary cryptographic protocol, and on the basis of their analysis, created a fake engineering station, an alternative to Siemens’ official station. The fake engineering station was able to command the controller according to the will of the attackers.
-
-
A Hacker’s Treasure: IoT Data Not Trashed
While consumers are aware that data needs to be wiped from smart phones and computers before discarding, the proliferation of internet connected (IoT) devices poses new challenges and risks, as they too retain valuable data.
-
-
Disinformation Moves from Fringe Sites to Facebook, YouTube
Lawmakers and regulators focusing their attention on Facebook, Twitter and YouTube for the platforms’ role in propagating disinformation may be missing a big chunk of other online sites and portals that drive conspiracies and outright falsehoods, according to a nonprofit group that is studying how disinformation works.
-
-
Foreign Campaign Intervention May Go Way Beyond Russia to China, Iran, North Korea, and Saudi Arabia
The risk of foreign intervention goes far beyond Russia. Indeed, this type of action has happened many times in U.S. history. What’s new in 2020 is that, over the past few years, Russians have shown other nations how easy it is to sow disinformation and disrupt democratic elections. Many countries, including the United States, seek to make the voting process easy so balloting is designed much more for user-friendliness than electoral security. At the same time, technology companies have created social media platforms that are easily exploited through disinformation, false news, and fake videos. What’s more, the use of this technology to disrupt campaigns is cheap and difficult to trace.
-
-
Hatechan: The Hate and Violence-Filled Legacy of 8chan
El Paso, Texas. Poway, California. Christchurch, New Zealand. Three White Power-inspired attacks by three white supremacists who posted paranoid racist manifestos right before the attacks. Three killing sprees. One targeted Muslims, another Jews, the third Hispanics. What they all had in common was 8chan. In just six years, 8chan has achieved a rather unenviable reputation as one of the vilest places on the Internet.
-
-
Action Needed to Stem Online Hate: Researchers
As Americans reflect on two mass shootings that claimed 31 lives last weekend, they’re asking how to stop the carnage. Researchers at a Los Angeles center devoted to tolerance say part of the answer lies in ending hate online. Political leaders and social media companies, they add, must help to tone down the hateful rhetoric.
-
-
From Across the Globe to El Paso, Changes in the Language of the Far-Right Explain Its Current Violence
In the past decade, the language of white supremacists has transformed in important ways. It crossed national borders, broadened its focus and has been influenced by current mainstream political discourse. I study political violence and extremism. In my recent research, I have identified these changes and believe that they can provide important insights into the current landscape of the American and European violent far-right. The changes also allow us to understand how the violent far-right mobilizes support, shapes political perceptions and eventually advances their objectives.
-
-
Unlocking Market Forces to Solve Cyber Risk
Markets have been slow to adjust to the multi-dimensional perils of cyber risk. Even headline-grabbing cyber incidents such as breaches of Equifax, Target, Anthem, Sony and Home Depot—along with NotPetya’s devastation of Merck, FedEx, and Maersk—have thus far had only fleeting impacts on assessments of major corporations’ prospects by investors, credit rating agencies and insurers. This disparity reflects the broader problem of a “cyber risk gap” between corporations’ exposure to cyber risks and the adequacy of their efforts to address it. Investors, insurers, credit rating agencies and others presently face this gap, and have been only slowly waking up to its magnitude.
-
-
Winning the Cyber War Is Not a Job the Army Can Do Alone
Britain has not been legally at war since 1945. Despite this, we have been in perpetual conflict since then and, apart from 1969, have lost soldiers on operations every single year. Today the sphere of that conflict now very much includes the online world where our adversaries – from Russian disinformation disseminators to IS’s terrorist cyber warriors – are a shadowy, but perpetual threat. In this increasingly antagonistic world, we must organize ourselves accordingly.
-
-
Practicing Cybersecurity Gets Easier
It’s expensive to train the people who defend us from cyberattacks. When big companies hold a large-scale exercise, they often take several months to prepare for it. Lots of people and computers, routers and other hardware form a complex infrastructure to create an attack that is as realistic as possible. That’s a good approach, but at the same time it is time consuming and expensive. This is where the Norwegian Cyber Range comes in, enabling medium and smaller players to train, too.
-
-
Combatting Russia’s Assault on Democracies: Lessons from Europe
A 2018 report by the Senate Foreign Relations Committee says: “For years, Vladimir Putin’s government has engaged in a relentless assault to undermine democracy and the rule of law in Europe and the United States. Mr. Putin’s Kremlin employs an asymmetric arsenal that includes military invasions, cyberattacks, disinformation, support for fringe political groups, and the weaponization of energy resources, organized crime, and corruption.” For people pondering the potential effects of Russian interference in the 2020 elections here in the United States, it is worth understanding what other democracies are doing to confront the same problem and what lessons can be learned from their experiences.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.