-
New and Secure Encryption: A Fresh Approach
Cryptography, i.e. the encryption of information, keeps us safe in our daily lives and yet we barely know it’s there. As digitalization progresses, the amount of data that needs to be protected is growing exponentially. This calls for exceptionally robust cryptographic solutions that are both fast and efficient in practice and, at the same time, absolutely secure.
-
-
Detecting Manipulations in Microchips
Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.
-
-
How Russia Turned America’s Helping Hand to Ukraine into a Vast Lie
Russia’s sustained disinformation campaign about a fictional U.S. bioweapons program in Ukraine is an example of how, “In a world that connects billions of people at a flash, the truth may have only a fighting chance against organized lying,” the Washington Post writes. “Disinformation is not just “fake news” or propaganda but an insidious contamination of the world’s conversations. And it is exploding.”
-
-
Antisemitism, False Information, and Hate Speech Find a Home on Substack
Substack continues to attract extremists and conspiracy theorists who routinely use the site to profit from spreading antisemitism, misinformation, disinformation and hate speech. Platforms with more lenient content moderation policies, like Substack, provide fertile ground for the spread of hateful rhetoric and false information – a known catalyst for offline harm and violence.
-
-
China Accused of Meddling in Canada’s Elections
Allegations are mounting that China may have interfered in Canada’s most recent federal elections to favor Prime Minister Justin Trudeau and his Liberal Party. Chinese information campaign appeared to have influenced votes in districts with large ethnic Chinese population.
-
-
Education and Awareness Are Key to Stopping Online Radicalization
The current battlefield for terrorism is not a faraway country but the computers and phones right next to us. Terrorists have taken advantage of this technology to allow conflict to transcend its geographic borders. They know that reaching one sympathetic viewer can create catastrophic consequences in support of their agenda. The social network is now an environment where everyone is vulnerable to encountering propaganda or misinformation online, making everyone susceptible to radicalization.
-
-
What Is the National Cybersecurity Strategy? What the Biden Administration Has Changed
On 2 March 2023 the Biden administration released its first National Cybersecurity Strategy. Some of the key provisions in the Strategy relate to the private sector, both in terms of product liability and cybersecurity insurance. It also aims to reduce the cybersecurity burden on individuals and smaller organizations. It provides some innovative ideas that could strengthen U.S. cybersecurity in meaningful ways and help modernize America’s technology industry, both now and into the future.
-
-
Is Your Cybersecurity Strategy Undermined by These Six Common Pitfalls?
Many security specialists harbor misconceptions about lay users of information technology, and these misconceptions can increase an organization’s risk of cybersecurity breaches. These issues include ineffective communications to lay users and inadequately incorporating user feedback on security system usability.
-
-
Hard-Right Social Media Activities Lead to Civil Unrest: Study
Does activity on hard-right social media lead to civil unrest? With the emergence and persistent popularity of hard-right social media platforms such as Gab, Parler, and Truth Social, it is important to understand the impact they are having on society and politics.
-
-
Perfectly Secure Digital Communications
Researchers have achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden.
-
-
Understanding Antisemitism on Twitter After Musk
New research has found a major and sustained spike in antisemitic posts on Twitter since the company’s takeover by Elon Musk on October 27, 2022. Researchers found that the volume of English-language antisemitic tweets more than doubled in the period following Musk’s takeover.
-
-
Extremist Propaganda Soars to All-Time High in 2022
In 2022, there has been a significant increase in racially or ethnically motivated violent extremist (RMVE) propaganda efforts, which included the distribution of racist and antisemitic fliers, stickers, banners, graffiti, and posters, as well as laser projections - with a total of 6,751 cases reported in 2022, compared to 4,876 in 2021.
-
-
Expanding the AI Toolbox of Cybersecurity Defenders
Scientists have taken a key step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks. DRL shows the promise of an autonomous AI in proactive cyber defense.
-
-
Russian Cyberattacks on U.S. Likely to Become Bolder, More Brazen
Repeated failures by Russian cyberattacks and disinformation campaigns to inflict lasting damage during the Kremlin’s ongoing war against Ukraine is unlikely to dampen Moscow’s resolve and could instead spur a new wave of riskier efforts against a wider set of targets.
-
-
U.S. Unveils Aggressive National Cybersecurity Strategy
The Biden administration is pushing for more comprehensive federal regulations to keep the online realm safer against hackers, including by shifting cybersecurity responsibilities away from consumers to industry and treating ransomware attacks as national security threats.
-
More headlines
The long view
States Rush to Combat AI Threat to Elections
This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.
Tantalizing Method to Study Cyberdeterrence
Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.