-
Flaws in 4G, 5G networks could allow hackers intercept calls, track location
Newly discovered vulnerabilities in 4G and 5G networks could be used to intercept phone calls and track users’ locations, according to researchers. Not only has 5G promised to be faster than previous generations, but it should also be more secure. That such serious vulnerabilities have been found in the new networks is hardly reassuring, as the 5G standard was specifically developed to better protect against these kind of attacks.
-
-
Protect confidential information from cyberattacks
The NSF is funding research aiming to develop new guidelines for sharing secret information through wireless communication that would improve security for users and minimizes cost.
-
-
Secure information exchange: Quantum communication over fiber-optic networks
Searching for better security during data transmission, governments and other organizations around the world have been investing in and developing technologies related to quantum communication and related encryption methods. Researchers are looking at how these new systems—which, in theory, would provide unhackable communication channels—can be integrated into existing and future fiber-optic networks.
-
-
U.S. Cyber Command cut Russian troll factory’s access to the internet
The U.S. Cyber Command blocked the internet access of the St. Petersburg’s-based Internet Research Agency (IRA), a Russian disinformation and propaganda outfit which was contracted by the Kremlin to orchestrate the social media disinformation campaign to help Donald Trump win the 2016 presidential election. The IRA’s access to the internet was blocked on midterms Election Day, and for a few days following the election.
-
-
Most laptops vulnerable to attacks via peripheral devices
Many modern laptops and an increasing number of desktop computers are much more vulnerable to hacking through common plug-in devices than previously thought, according to new research. The research shows that attackers can compromise an unattended machine in a matter of seconds through devices such as chargers and docking stations.
-
-
Telegram used by ISIS to spread propaganda globally
The Counter Extremism Project (CEP) this week reports about a Telegram channel that called for lone actor terrorist attacks in London, alongside other online websites that host ISIS videos and propaganda online. The encrypted messaging app is the platform of choice for terrorist group to call for violence.
-
-
U.S. hate groups hit record number last year amid increased violence
American hate groups had a bumper year in 2018 as a surge in black and white nationalist groups lifted their number to a new record high, the Southern Poverty Law Center said in a report issued Wednesday. The increase was driven by growth in both black and white nationalist groups, the SPLC said. The number of white nationalist groups jumped from 100 to 148, while the number of black nationalist groups — typically anti-Semitic, anti-LGBTQ and anti-white — rose from 233 to 264. Some conservative groups have accused the SPLC of unfairly labeling them as “hate groups,” and last month, the Center for Immigration Studies sued the SPLC for “falsely designating” it as a hate group in 2016, saying the SPLC has produced no evidence that the group maligns immigrants as a class.
-
-
Top password managers have fundamental flaws
Top password managers have fundamental flaws that expose user credentials in computer memory while locked, according to new research. Sixty Million users and 93,000 businesses worldwide rely on 1Password, Dashlane, KeePass, and LastPass to protect data.
-
-
Expanding cybersecurity education to fill job market shortfall
Experts say that the U.S. cyber workforce shortfall is growing. By the 2022, the shortage of cybersecurity professionals is predicted to be 1.8 million. Colleges and universities expand their cybersecurity education offerings.
-
-
Putting data privacy in the hands of users
In today’s world of cloud computing, users of mobile apps and web services store personal data on remote data center servers. Services often aggregate multiple users’ data across servers to gain insights on, say, consumer shopping patterns to help recommend new items to specific users, or may share data with advertisers. Traditionally, however, users haven’t had the power to restrict how their data are processed and shared. New platform acts as a gatekeeper to ensure web services adhere to a user’s custom data restrictions.
-
-
Next-generation grid security tech
Researchers will demonstrate the effectiveness of metro-scale quantum key distribution (QKD) as a means of secure communication for the nation’s electricity suppliers. This initial milestone is part of the team’s three-year project focused on next-generation grid security.
-
-
Don’t be fooled by fake images and videos online
Advances in artificial intelligence have made it easier to create compelling and sophisticated fake images, videos and audio recordings. Meanwhile, misinformation proliferates on social media, and a polarized public may have become accustomed to being fed news that conforms to their worldview. All contribute to a climate in which it is increasingly more difficult to believe what you see and hear online. There are some things that you can do to protect yourself from falling for a hoax. As the author of the upcoming book Fake Photos, to be published in August, I’d like to offer a few tips to protect yourself from falling for a hoax.
-
-
Are Russian trolls saving measles from extinction?
Scientific researchers say Russian social-media trolls who spread discord before the 2016 U.S. presidential election may also contributed to the 2018 outbreak of measles in Europe that killed 72 people and infected more than 82,000 — mostly in Eastern and Southeastern European countries known to have been targeted by Russia-based disinformation campaigns. Experts in the United States and Europe are now working on ways to gauge the impact that Russian troll and bot campaigns have had on the spread of the disease by distributing medical misinformation and raising public doubts about vaccinations.
-
-
How far should organizations be able to go to defend against cyberattacks?
Organizations can and should be encouraged to take passive defense measures, like gathering intelligence on potential attackers and reporting intrusions. But in my view they should be discouraged – if not prevented – from acting aggressively, because of the risk of destabilizing corporate and international relations. If the quest for cyber peace degenerates into a tit-for-tat battle of digital vigilantism, global insecurity will be greater, not less.
-
-
Developing a system to identify, patch software security holes
DARPA is funding research of security vulnerabilities in web software. A new system called GAMEPLAY (for Graph Analysis for Mechanized Exploit-generation and vulnerability Patching Leveraging human Assistance for improved Yield) will spot security weaknesses in the millions – sometimes billions – of lines of code that run websites including banking and online shopping which are attractive to hackers.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.