-
Making scalable on-chip security pervasive
For the past decade, cybersecurity threats have moved from high in the software stack to progressively lower levels of the computational hierarchy, working their way towards the underlying hardware. The rise of the Internet of Things (IoT) has driven the creation of a rapidly growing number of accessible devices and a multitude of complex chip designs needed to enable them. A new DARP program focuses on addressing the economic and technical challenges associated with incorporating scalable defense mechanisms into chip designs.
-
-
Online voting not ready for prime time
Online voting is often considered a way to improve voter turnout and security. But according to one expert, computer scientists have got a long way to go before they make it a viable alternative to pencils and paper.
-
-
AfD Bunestag member under Russian influence: Report
Markus Frohnmaier, an MP for the far-right, populist AfD party, could be controlled by Russia, several European media outlets have reported. Frohnmaier has publicly sided with Moscow on practically each and every issue important to Vladimir Putin. The investigative report – the result of a joint effort by several leading European news organizations – concluded that Frohnmaier “stands under the influence of Moscow” and that his political and legislative actions aim to further Russia’s strategic interests.
-
-
Nagging security concerns over using Huawei’s tech in Europe
New report urges NATO members to look to emulate Britain, which created an entire government office to scrutinize Huawei’s products for security problems.
-
-
Attacks against elections are inevitable – Estonia shows what can be done
Kremlin-backed attackers are working to influence the upcoming European Parliament elections, according to cybersecurity firm FireEye. These new reports highlight rising fears of digital attacks on democracy around the world, including on the U.S. presidential elections in 2020. Russian interference in the West is not new. The experiences of Estonia – the first country ever victim to a clearly coordinated and politically motivated cyber operation – can inform American and European defenses to these complex threats.
-
-
Hackers can dupe radiologists, AI software
Hackers can access a patient’s 3-D medical scans to add or remove malignant lung cancer, and deceive both radiologists and artificial intelligence algorithms used to aid diagnosis, according to a new study.
-
-
Supporting global companies against cyber threats
A consortium of U.K. cyber security experts is to support global businesses to tackle online threats and protect themselves from cybercrime. The Cyber Readiness for Boards project has been launched to explore the factors shaping U.K. board decisions around cyber risk and develop interventions to provide guidance and support.
-
-
Bigger than Huawei: U.S. broadens scrutiny of Chinese technology
A flurry of seemingly disconnected actions by the U.S. government to curb the involvement of Chinese technology firms in the U.S. economy over the past year reflects the Trump administration’s intensifying concern that those firms could — now or in the future — abet espionage by Beijing’s intelligence services.
-
-
AI automatically detects disturbances in power supply grids
The grid is changing as the big, centralized providers of the past are replaced by smaller, distributed suppliers. Keeping such complex networks running stable requires high-resolution sensor technology – AI provides a way to make accurate predictions and automatically detect any disturbances or anomalies in real time.
-
-
April Fools hoax stories may offer clues to help identify “fake news”
Studying April Fools hoax news stories could offer clues to spotting ‘fake news’ articles, new research reveals. Researchers interested in deception have compared the language used within written April Fools hoaxes and fake news stories.
-
-
In disasters, Twitter users with large networks get out-tweeted
New study shows that when it comes to sharing emergency information during natural disasters, timing is everything. The study on Twitter use during hurricanes, floods and tornadoes offers potentially life-saving data about how information is disseminated in emergency situations, and by whom. Unlikely heroes often emerge in disasters, and the same is true on social media.
-
-
British oversight body: Security flaws in Huawei 5G networks
A British oversight board has slammed the Chinese telecom giant Huawei for software security flaws. The report, however, stopped short of blaming Chinese intelligence agencies for the engineering defects. The United States is concerned that Huawei is a front for the Chinese intelligence services, and that rolling out Huawei’s 5G system in Europe would open the door for Chinese spying or sabotage.
-
-
Why the next terror manifesto could be even harder to track
Just before his shooting spree at two Christchurch, New Zealand mosques, the alleged mass murderer posted a hate-filled manifesto on several file-sharing sites. Soon, the widespread adoption of artificial intelligence on platforms and decentralized tools like IPFS will mean that the online hate landscape will change. Combating online extremism in the future may be less about “meme wars” and user-banning, or “de-platforming,” and could instead look like the attack-and-defend, cat-and-mouse technical one-upsmanship that has defined the cybersecurity industry since the 1980s. No matter what technical challenges come up, one fact never changes: The world will always need more good, smart people working to counter hate than there are promoting it.
-
-
Drones pose significant cyber, privacy challenges
Growing drone use in populated areas poses significant risks that, without additional safeguards, could result in attacks by malicious entities and exploited for use in cyberattacks, terrorism, crime and invasion of privacy.
-
-
AG: Muller did not find that Trump’s campaign “conspired with the Russian government” 2016 election interference effort
On Saturday afternoon, Attorney General William Barr sent Congress his “principal conclusions” of the Mueller report. Barr quotes the Mueller report to say that “[T]he investigation did not establish that members of the Trump Campaign conspired or coordinated with the Russian government in its election interference activities.” The Mueller report does not take a position on whether or not Trump engaged in obstruction of justice. Barr writes: “The Special Counsel… did not draw a conclusion — one way or the other — as to whether the examined conduct constituted obstruction.” The AG quotes the report to say that “while this report does not conclude that the President committed a crime, it also does not exonerate him.”
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.