-
Off-the-shelf smart devices easy to hack
Off-the-shelf devices that include baby monitors, home security cameras, doorbells, and thermostats were easily co-opted by cyber researchers at Ben-Gurion University of the Negev (BGU). As part of their ongoing research into detecting vulnerabilities of devices and networks expanding in the smart home and Internet of Things (IoT), the researchers disassembled and reverse engineered many common devices and quickly uncovered serious security issues.
-
-
DHS S&T release new cybersecurity research portfolio and technology guides
DHS S&T has released two new guides — 2018 Cyber Security Division Portfolio Guide and the 2018 Cyber Security Division Technology Guide — that will boost opportunities to transition its mature cybersecurity solutions and spur community discussion about its research and development (R&D) priorities.
-
-
To stop fake news, internet platforms should choose quality over quantity: Study
“Fake news” has made headlines and dominated social media chatter since the 2016 presidential election. It appears to be everywhere, and researchers are still determining the scale of the problem. A new study examines fake news and its prevalence and impact across Google, Facebook, and Twitter. The authors offer recommendations for stemming the flow and influence of fake news, and in particular call for more interdisciplinary research—including more collaboration between internet platforms and academia — “to reduce the spread of fake news and to address the underlying pathologies it has revealed.”
-
-
Putin: “Jews” with Russian citizenship may have meddled in U.S. election
In a weekend interview on NBC News, President Vladimir Putin, in an effort to deflect attention from the role the Kremlin’s hackers and disinformation specialists played in meddling in the 2016 U.S. election, said that such meddling was probably the work of “Jews” or other minorities in the Russian Federation. American Jewish organizations criticized Putin for giving voice to conspiracy theories which were at the core of the Protocols of the Elders of Zion, an anti-Semitic fabricated text, first published in Russia in 1903, purporting to describe a Jewish plan for global domination.
-
-
Almost no progress on securing U.S. voting machines in last two years
By a number of key metrics, the United States has failed to make significant progress securing voting machines, despite increasing warnings about system vulnerabilities from election officials and national security experts. “The threats of both hacking and foreign interference are undeniable, yet we’re not doing all we can as a country to protect machines or ensure correct vote totals if a successful attack does occur,” says the author of a just-published study.
-
-
Study: On Twitter, false news travels faster than true stories
A new study by three MIT scholars has found that false news spreads more rapidly on the social network Twitter than real news does — and by a substantial margin. “We found that falsehood diffuses significantly farther, faster, deeper, and more broadly than the truth, in all categories of information, and in many cases by an order of magnitude,” says one researcher. “These findings shed new light on fundamental aspects of our online communication ecosystem,” says another researcher, adding that the researchers were “somewhere between surprised and stunned” at the different trajectories of true and false news on Twitter.
-
-
Large-scale scientific investigation required to combat fake news: Researcher
The indictment of 13 Russians in the operation of a troll farm that spread false information related to the 2016 U.S. presidential election has renewed the spotlight on the power of fake news to influence public opinion. Researchers call for a coordinated investigation into the underlying social, psychological and technological forces behind fake news. This is necessary to counteract the phenomenon’s negative influence on society, the researchers say.
-
-
NSA, UWF partner to accelerate cybersecurity degree completion, workforce development
The University of West Florida and the National Security Agency announced a partnership to enhance cybersecurity workforce development and create accelerated pathways toward completion of an undergraduate cybersecurity degree program. The agreement allows students who complete the Joint Cyber Analysis Course to earn undergraduate credit hours at UWF. JCAC is open to active military. The six-month JCAC course is designed to train individuals with limited computer experience and make them proficient in cyber analysis.
-
-
Cyberspace is the new battlespace
“Cyberattacks on and within our nation occur daily, hourly, and by the minute. Scores of them have occurred since I walked into this building a few minutes ago. No one is immune. The cyber threat to our nation is going to get worse before it gets better,” former Secretary of Homeland Security Jeh Johnson said Wednesday, 7 March 2018, at the Boston Conference on Cybersecurity. “Bad cyber actors, ranging from nation-states, cybercriminals, hacktivists and those who engage in the growing Ransomware industry—are increasingly aggressive, ingenious, and tenacious. Those of us on defense struggle to keep up.”
-
-
Lawmakers seek answers from election equipment vendors on security of voting machines
The U.S. intelligence community has confirmed that Russia interfered with the 2016 elections; Russian actors attempted to hack a U.S. voting software company and at least twenty-one states’ election systems. Recent reports indicate that U.S.-based firms operating on U.S. government platforms gave Russian authorities access to their source code. Lawmakers are inquiring about the security of the voting machines of the major American vendors, and whether these vendors have been asked to share the source code or other sensitive or proprietary details associated with their voting machines with Russian entities.
-
-
Extremists exploit gun control debate to promote hatred of Jews
White supremacists are attempting to exploit the tragic mass shooting in Parkland, Florida, and the ensuing debate over gun control to push an anti-Semitic agenda. Many of these white supremacists are publicly framing the battle over gun control as a struggle between beleaguered whites who want to preserve their traditions in the face of a Jewish onslaught. The ADL says that white supremacists’ anti-Semitic attacks intensified in the wake of NRA head Wayne LaPierre’s 22 February speech to CPAC. LaPierre, perhaps unknowingly, used terms which are buzzwords white supremacists associate with Jews, such as “European-style socialists.” LaPierre said, “A tidal wave of new European-style socialists [has seized] control of the Democratic party.” The only people LaPierre mentioned as examples of people using “social engineering” to try to take away the guns and freedoms of Americans were two Jewish businessmen, Michael Bloomberg and George Soros.
-
-
Startup offering a solution to deter dangerous railway hacking
Rail transport is undergoing a huge transformation thanks to automated, wireless and connected technologies that whoosh passengers down the tracks faster and more efficiently than ever before possible. However, these same technologies have opened a door to new types of cyber-attacks that can threaten passenger safety, disrupt service and cause serious economic damage. A new startup has raised $4.7 million in seed money to develop its proactive solution to protect railways and metros.
-
-
Russians are hacking our public-commenting system, too
Russia has found yet another way surreptitiously to influence U.S. public policy: Stealing the identities of real Americans and then using these identities to file fake comments during the comment submission period preceding the formulation of public policies. For example, in the course of its deliberations on the future of Internet openness, the FCC logged about half a million comments sent from Russian email addresses – but, even more unnerving, it received nearly eight million comments from email domains associated with FakeMailGenerator.com with almost identical wording. Researchers, journalists, and public servants have found a wide range of fake comments and stolen identities in the public proceedings of the Labor Department, Consumer Financial Protection Bureau, Federal Energy Regulatory Commission, and Securities and Exchange Commission.
-
-
Goodbye James Bond, hello big data
Just as the technological revolution has transformed how people live and do business, it has upended the often hidebound field of intelligence gathering. Where once the focus might have been on the savvy agent clandestinely dashing around the world, like James Bond, now it’s on something far less sexy but no less vital: big data. “That [Bond] model, if it was ever true, is completely over,” said Sir John Sawers, chief of Britain’s Secret Intelligence Service (SIS), known to fans of spy novels as MI6, from 2009 to 2014. “Now, the most important person in any intelligence service is the data analyst, because it’s the data analyst who will tell you where the threats are coming from and where the opportunities are emerging that you as an intelligence agency can exploit.”
-
-
Combining old and new to create a novel power grid cybersecurity tool
An innovative R&D project that combines cybersecurity, machine learning algorithms and commercially available power system sensor technology to better protect the electric power grid has sparked interest from U.S. utilities, power companies and government officials. Creating innovative tools and technologies to reduce the risk that energy delivery might be disrupted by a cyber incident is vital to making the nation’s electric power grid resilient to cyber threats.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.