-
Cyber toolkit for criminal investigations
cybercrimes reached a six-year high in 2017, when more than 300,000 people in the United States fell victim to such crimes. Losses topped $1.2 billion. Cybercriminals can run, but they cannot hide from their digital fingerprints.
-
-
Dark web marketplace for SSL and TLS certificates
A thriving marketplace for SSL and TLS certificates—small data files used to facilitate confidential communication between organizations’ servers and their clients’ computers—exists on a hidden part of the internet.
-
-
Studying how hate and extremism spread on social media
The ADL and the Network Contagion Research Institute will partner to produce a series of reports that take an in-depth look into how extremism and hate spread on social media – and provide recommendations on how to combat both.
-
-
Four ways social media platforms could stop the spread of hateful content in aftermath of terror attacks
Monitoring hateful content is always difficult and even the most advanced systems accidentally miss some. But during terrorist attacks the big platforms face particularly significant challenges. As research has shown, terrorist attacks precipitate huge spikes in online hate, overrunning platforms’ reporting systems. Lots of the people who upload and share this content also know how to deceive the platforms and get round their existing checks. So what can platforms do to take down extremist and hateful content immediately after terrorist attacks? I propose four special measures which are needed to specifically target the short term influx of hate.
-
-
Blocking digital gold diggers
It is a phenomenon known to almost all of us: you browse the web and suddenly your computer slows down and runs loudly. This could be due to so-called crypto mining, meaning the access to computer power to generate cryptocurrencies without the knowledge of the user. New software, called “CoinEater,” blocks crypto mining.
-
-
Another Steel Dossier detail appears true
On the final page of his 35-page dossier, former British intelligence officer Christopher Steele refers to a company, whose name is redacted, that allegedly was used to hack the Democratic party. Today, the New York Times identifies the company and its owner, Aleksej Gubarev, and says that according to a newly revealed report, the allegations against the Russian technology entrepreneur’s operations check out.
-
-
Russia attempted 2018 interference, gearing up to infiltrate election systems in 2020
Defense Department and Homeland Security officials warn Russia did try to interfere in the 2018 election, and the United States is not prepared for what foreign adversaries likely will launch in 2020. One official told lawmakers on the House Appropriations Homeland Security Subcommittee that “what keeps him up at night” is thinking about the new ways adversaries will attempt to infiltrate US election systems in 2020.
-
-
Trapdoor found in SwissVote election system
Researchers have examined the source code published as part of the SwissPost e-voting system, provided by Scytl, and discovered a cryptographic trapdoor. If exploited, researchers say this could allow insiders who ran or implemented the election system to modify votes undetected.
-
-
Fraudulent news, disinformation become “new normal” political tactics
New report warns of the risk of fraudulent news and online disinformation becoming a normalized part of U.S. political discourse. The report sounds an alarm that fraudulent news and online disinformation, which distort public discourse, erode faith in journalism, and skew voting decisions, are becoming part of the toolbox of hotly contested modern campaigns.
-
-
Information literacy must be improved to stop spread of “fake news”
It is not difficult to verify whether a new piece of information is accurate; however, most people do not take that step before sharing it on social media, regardless of age, social class or gender, a new study has found.
-
-
A new world for hackers: Acoustic side-channel attack
During the DNA synthesis process in a laboratory, recordings can be made of the subtle, telltale noises made by synthesis machines. And those captured sounds can be used to reverse-engineer valuable, custom-designed genetic materials used in pharmaceuticals, agriculture and other bioengineering fields.
-
-
Deterrence in the cyber age: U.K. Foreign Secretary's speech
U.K. foreign secretary Jeremy Hunt last Thursday spoke at Glasgow University on cybersecurity and the U.K. government’s approach to deterring cybercrime. “In the cyber age, an authoritarian regime armed with nothing more ambitious than a laptop computer could try to manipulate our democracy, Hunt said. “For every example of publicly attributed interference [by Russia], there have been others that never saw the light of day.” He added: “The material fact is that the Russian state has tried to subvert democracy,” concluding: “We can no longer afford to wait until an authoritarian regime demonstrably succeeds in changing the outcome of an election and weakening trust in the integrity of democracy itself. The risk is that after just a few cases, a pall of suspicion would descend over a democratic process – and once that happens, the damage would be difficult, perhaps impossible, to repair.”
-
-
U.S. military steps up cyberwarfare effort
The U.S. military has the capability, the willingness and, perhaps for the first time, the official permission to preemptively engage in active cyberwarfare against foreign targets. The first known action happened as the 2018 midterm elections approached: U.S. Cyber Command, the part of the military that oversees cyber operations, waged a covert campaign to deter Russian interference in the democratic process.
-
-
White supremacist propaganda and events soared in 2018
White supremacists dramatically stepped up their propaganda efforts targeting neighborhoods and campuses in 2018, far exceeding any previous annual distribution count for the United States and showing how these extremist groups are finding ways to share hateful messages while hiding the identity of individual members.
-
-
Securing the “internet of things” in the quantum age
Quantum computers can in principle execute calculations that today are practically impossible for classical computers. Bringing quantum computers online and to market could one day enable advances in medical research, drug discovery, and other applications. But there’s a catch: If hackers also have access to quantum computers, they could potentially break through the powerful encryption schemes that currently protect data exchanged between devices.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.