-
A first: High-dimensional quantum encryption demonstrated
For the first time, researchers have sent a quantum-secured message containing more than one bit of information per photon through the air above a city. The demonstration showed that it could one day be practical to use high-capacity, free-space quantum communication to create a highly secure link between ground-based networks and satellites, a requirement for creating a global quantum encryption network.
-
-
Managing extreme speech on social media
Extreme speech on social media—foul language, threats and overtly sexist and racist language—has been in the spotlight. While such language is not new, recent increases of extreme and offensive posts on social media have led to politicians, celebrities and pundits calling for social media platforms to do more in curbing such speech, opening new debates about free speech in the digital age. A new study shows that while people tend to dislike extreme speech on social media, there is less support for outright censorship. Instead, people believe sites need to do a better job promoting healthy discourse online.
-
-
U.S. government’s cybersecurity readiness lagging compared to almost every other industry
SecurityScorecard the other day released its annual U.S. State and Federal Government Cybersecurity Report. The study paints a grim picture of the overall cyber health of the U.S. government entities. In the midst of investigations into a potential 2016 election hacking, regular major malware events, and an overall increase in the number of sophisticated cyberattacks, the report highlights that the government sector is lagging compared to almost every other industry. The state of U.S. government cyber health places mission-critical services and infrastructure at risk.
-
-
Google’s assault on privacy: a reminder
“On its best day, with every ounce of technology the U.S. government could muster, it could not know a fraction as much about any of us as Google does now” (Shelly Palmer, technology analyst).
-
-
Islamic State’s Twitter network is decimated, but other extremists face much less disruption
The use of social media by a diversity of violent extremists and terrorists and their supporters has been a matter of concern for law enforcement and politicians for some time. While it appears that Twitter is now severely disrupting pro-IS accounts on its platform, our research found that other jihadists were not subject to the same levels of take down. The migration of the pro-IS social media community from Twitter to the messaging service Telegram particularly bears watching. Telegram currently has a lower profile than Twitter with a smaller user base and higher barriers to entry, with users required to provide a mobile phone number to create an account. While this means that fewer people are being exposed to IS’s online content via Telegram, and are thereby in a position to be radicalized by it, it may mean that Telegram’s pro-IS community is more committed and therefore poses a greater security risk than its Twitter variant.
-
-
U.S. needs stronger response to Russian interference in presidential election: Expert
One of the greatest threats to the United States, Alexander Hamilton said in Federalist Paper #68, was “the desire in foreign powers to gain an improper ascendant in our councils” — “by raising a creature of their own to the chief magistracy of the Union.” John Cohen, former principal deputy undersecretary for intelligence and analysis at DHS, says that Russia’s meddling in the 2016 presidential election shows how prescient Hamilton was. “During my entire career in homeland security, counter-intelligence and law enforcement, I have not seen a greater existential threat to America’s sovereignty and national security,” he says. “That so many political partisans appear so willing to overlook this threat is alarming – and reflects the national division that may have been one of the goals of the Russian campaign.”
-
-
How online hate infiltrates social media and politics
In late February, an anti-Semitic website known as the Daily Stormer — which receives more than 2.8 million monthly visitors — announced, “Jews Destroy Another One of Their Own Graveyards to Blame Trump.” The story was inspired by the recent desecration of a Jewish cemetery in Philadelphia. To whom, and how many, this example of conspiracy mongering may travel is, in part, the story of “fake news,” the phenomenon in which biased propaganda is disseminated as if it were objective journalism in an attempt to corrupt public opinion. Looking at the most-visited websites of what were once diminished movements – white supremacists, xenophobic militants, and Holocaust deniers, to name a few – reveals a much-revitalized online culture. When he was asked about the Philadelphia vandalism, President Trump told the Pennsylvania attorney general the incident was “reprehensible.” But he then went on to speculate that it might have been committed “to make others look bad.” That feeds the very doubt that extremist groups thrive on. And the cycle continues.
-
-
New methods defeat cyberattacks on 3D printers
With cyberattacks on 3D printers likely to threaten health and safety, researchers have developed novel methods to combat them, according to a groundbreaking study. Among several unique techniques, the researchers are using cancer imaging techniques to detect intrusions and hacking of 3D printer controllers.
-
-
Popular messaging apps: Encrypting is easy but authenticating is hard
Most users of popular messaging apps Facebook Messenger, What’sApp and Viber are leaving themselves exposed to fraud or other hacking because they don’t know about or aren’t using important security options. Even though What’sApp and Viber encrypt messages by default, all three messaging apps also require what’s called an authentication ceremony to ensure true security — but because most users are unaware of the ceremony and its importance.
-
-
MSU cybersecurity scholarship program receives $3.11 million grant
Mississippi State University will receive $3.11 million through a National Science Foundation grant to continue the university’s role in the CyberCorps Scholarship for Service program, which prepares qualified cybersecurity professionals for entry into the government workforce. As part of the grant, which will support the program for four years, East Mississippi Community College students planning to attend MSU are eligible to receive scholarships and support.
-
-
USB connections less secure than has been thought
USB connections, the most common interface used globally to connect external devices to computers, are vulnerable to information “leakage,” making them even less secure than has been thought. Researchers tested more than 50 different computers and external USB hubs and found that over 90 percent of them leaked information to an external USB device.
-
-
Cybercriminals are not as “anonymous” as we think
Understanding a cybercriminal’s backstory - where they live, what they do and who they know, is key to cracking cybercrime. Online crime is of course online, but there is also a surprisingly strong offline and local dimension. Cybercriminals are often seen as faceless, international, computer masterminds, who are almost impossible to identify or understand as a result. But contextualizing their threat and motivations is key to stopping them.
-
-
DNA sequencing tools vulnerable to cybersecurity risks
Rapid improvement in DNA sequencing has sparked a proliferation of medical and genetic tests that promise to reveal everything from one’s ancestry to fitness levels to microorganisms that live in your gut. A new study finds evidence of poor computer security practices used throughout the field. Researchers have also demonstrated for the first time that it is possible — though still challenging — to compromise a computer system with a malicious computer code stored in synthetic DNA. When that DNA is analyzed, the code can become executable malware that attacks the computer system running the software.
-
-
Hacking cybersecurity in order to anticipate attacks
Imagine two groups at war. One defends every attack as it comes. The other anticipates threats before they happen. Which is more likely to win? In cybersecurity, understanding the potential for attacks is critical. This is especially true for mobile and wireless devices, since they are constantly connected and continuously streaming and collecting data.
-
-
Police turn to hackathons as crime fighting goes digital
Police and law enforcement staff are turning to hackathons – collaborative events for developing technology – to come up with new ways of searching for clues within the terabytes of data that many people produce every year.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.