-
Unbreakable encrypted messages a step closer
Until now, unbreakable encrypted messages were transmitted via a system envisioned by American mathematician Claude Shannon, considered the “father of information theory.” Shannon combined his knowledge of algebra and electrical circuitry to come up with a binary system of transmitting messages that are secure, under three conditions: the key is random, used only once, and is at least as long as the message itself. Researchers have now moved beyond the theoretical in demonstrating that an unbreakable encrypted message can be sent with a key that is far shorter than the message — the first time that has ever been done.
-
-
Strengthening national security by improving intelligence software
An intelligence analyst hunting for answers in a sea of data faces steep challenges: She must choose the right search terms, identify useful results, and organize them in a way that reveals new connections. Making that process quicker and more intuitive could yield faster answers to key national security questions. Researchers are developing intelligence software that allows analysts to interact more closely with their data.
-
-
Tackling rumors during crises
The proliferation of rumors during a crisis can hinder efforts by emergency personnel trying to establish facts. That is why a doctoral student at BGU’s Department of Emergency Medicine has developed a methodology for tracking rumors and guidelines for how to control them.
-
-
White Nationalist groups growing much faster than ISIS on Twitter
The number of White Nationalists and self-identified Nazi sympathizers on Twiter had multiplied more than 600 percent in the last four years — outpacing ISIS in all social media aspects, from the number of follower counts to the number of daily tweets, a new study found. The study’s author notes that ISIS has gained a reputation for effectively using Twitter for propaganda and recruitment, but that White Nationalist groups have excelled even more in exploiting the medium. The report says that unlike the campaign Twitter has been conducting against ISIS, White Nationalists are continuing to use the service with “relative impunity.”
-
-
Vulnerabilities found in cars connected to smartphones
Many of today’s automobiles leave the factory with secret passengers: prototype software features that are disabled but that can be unlocked by clever drivers. In what is believed to be the first comprehensive security analysis of its kind, a team of researchers has found vulnerabilities in MirrorLink, a system of rules that allow vehicles to communicate with smartphones.
-
-
FBI director calls for “adult conversation” on encryption – and the privacy-security balance
James Comey, the FBI director, has again said that end-to-end encryption on digital devices makes it impossible for his agency to investigate crimes and acts of terrorism— and called for an “adult conversation” with the manufacturers of these devices. Widespread encryption built into smartphones was “making more and more of the room that we are charged to investigate dark,” Comey said at a cybersecurity symposium.
-
-
Researchers demonstrate how data can be stolen from isolated “air-gapped” computers
Air-gapped computers are isolated — separated both logically and physically from public networks — ostensibly to prevent their being hacked over the Internet or within company networks. Researchers at the Ben-Gurion University of the Negev (BGU) have demonstrated that an unmodified USB connected to a computer with malicious code can be used to steal data from infected and even “air-gapped” computers.
-
-
A chip that checks for sabotage, flags defects
With the outsourcing of microchip design and fabrication a worldwide, $350 billion business, bad actors along the supply chain have many opportunities to install malicious circuitry in chips. These Trojan horses look harmless but can allow attackers to sabotage healthcare devices; public infrastructure; and financial, military, or government electronics. Researchers are developing a unique solution: a chip with both an embedded module that proves that its calculations are correct and an external module that validates the first module’s proofs.
-
-
Israeli tech company’s spyware turns UAE activist’s iPhone into a self-tracking device
Two University of Toronto researchers have uncovered an iPhone-based attack on Ahmed Mansoor, a prominent United Arab Emirates human rights defender. The attack employed spyware produced by NSO Group — an Israeli technology company founded by former members of Unit 8200, the Israeli military’s electronic surveillance branch – which is sold to government for the purpose of spying on their citizens.
-
-
Vulnerabilities found in iPhone, iPad operating system
An international team of computer science researchers has identified serious security vulnerabilities in the iOS — the operating system used in Apple’s iPhone and iPad devices. The vulnerabilities make a variety of attacks possible. The researchers focused on the iOS’s “sandbox,” which serves as the interface between applications and the iOS. The iOS sandbox uses a set “profile” for every third-party app. This profile controls the information that the app has access to and governs which actions the app can execute.
-
-
Social media helps build a sense of community in the aftermath of disaster
After natural disasters communities rely heavily on local governments to provide the necessary resources and information to respond to such disasters, but these approaches are not well equipped to meeting individual needs. As a complement to traditional methods, social media can provide a more personalized resource as well as fostering a sense of community in response to the crisis.
-
-
Researchers look for ways to keep cars safe from hacking
In 2015, two researchers remotely hacked a Jeep Cherokee being driven by a reporter who documented how the researchers controlled everything from the car’s radio and media console to its brakes and steering. For computer scientists at the University of Arkansas at Little Rock, the exercise demonstrated how vulnerable smart cars with GPS, Bluetooth, and Internet connections are to cyberattacks – and they decided to do something about it.
-
-
After the NSA hack: Cybersecurity in an even more vulnerable world
It is looking increasingly likely that computer hackers have in fact successfully attacked what had been the pinnacle of cybersecurity – the U.S. National Security Agency (NSA). Cyberweapons and their capabilities are becoming an increasing part of international relations, forming part of foreign policy decisions and even sparking what has been called a “cyber arms race.” The cyberattack on the NSA’s – specifically, the attack on the Equation Group, the NSA’s spying element – may be part of this global interplay. The attack is also further proof of the cybersecurity industry’s axiom about the highly asymmetric probabilities of successful attack and successful defense: Attackers need to succeed only once; defenders have to be perfect every time. As sophisticated as NSA’s highly secure network is, the agency cannot ever fully protect itself from cyberattackers.
-
-
People disregard security warnings on computers because these warnings come at bad times
Software developers listen up: if you want people to pay attention to your security warnings on their computers or mobile devices, you need to make them pop up at better times. A new study finds the status quo of warning messages appearing haphazardly — while people are typing, watching a video, uploading files, etc. — results in up to 90 percent of users disregarding them.
-
-
U.S. social media strategy can use Twitter more effectively to weaken ISIS influence
Opponents of ISIS and Syria are six times greater in number on Twitter than ISIS supporters, but those sympathetic to the group are more active on the social media platform, according to a new RAND Corporation study. The researchers, analyzing more than twenty-three million tweets posted in Arabic over a 10-month period, found that, on average, supporters of ISIS produce 50 percent more tweets than opponents on a typical day, although there is evidence that ISIS opponents are increasing their activity.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.