-
Shadow Play: A Pro-China and Anti-U.S. Influence Operation Thrives on YouTube
Experts have recently observed a coordinated inauthentic influence campaign originating on YouTube that’s promoting pro-China and anti-US narratives in an apparent effort to shift English-speaking audiences’ views of those countries’ roles in international politics, the global economy and strategic technology competition.
-
-
Hidden Fortunes and Surprising Overestimations in Cybercrime Revenue
To what extent methodological limitations and incomplete data impact the revenue estimations of cybercriminal groups using the Bitcoin blockchain was largely unknown. A new study challenges existing figures regarding cybercriminals’ Bitcoin earnings to date, revealing the full scale of the financial impact of cybercriminal activity.
-
-
The Cross-Platform Evasion Toolbox of Islamic State Supporters
Extremists exploiting platforms for their own ends and learning along the way is a tale as old as the internet and one that has become even more pronounced in the era of ubiquitous access to social media. Moustafa Ayad writes that over the past three years, a set of exploitation and evasion tactics have become central for Islamic State supporters online, and they are only getting more elaborate.
-
-
Why Federal Efforts to Protect Schools from Cybersecurity Threats Fall Short
In August 2023, the White House announced a plan to bolster cybersecurity in K-12 schools – and with good reason. Between 2018 and mid-September 2023, there were 386 recorded cyberattacks in the U.S. education sector and cost those schools $35.1 billion. K-12 schools were the primary target. While the steps taken by the White House are positive, as someone who teaches and conducts research about cybersecurity, I don’t believe the proposed measures are enough to protect schools from cyberthreats.
-
-
AI Networks Are More Vulnerable to Malicious Attacks Than Previously Thought
Artificial intelligence tools hold promise for applications ranging from autonomous vehicles to the interpretation of medical images. However, a new study finds these AI tools are more vulnerable than previously thought to targeted attacks that effectively force AI systems to make bad decisions.
-
-
Interference-Free Elections? How Quaint!
There are three major elections taking place in 2024: in Taiwan, the United States, and Russia. So, what are the chances that we’ll see cyber-enabled disruption campaigns targeting each of these polls? Tom Uren writes that in the case of the upcoming U.S. election, it seems inevitable.
-
-
New CPU Vulnerability Makes Virtual Machine Environments Vulnerable
Researchers have identified a security vulnerability that could allow data on virtual machines with AMD processors to fall under the control of attackers.
-
-
Is the Fear of Cyberwar Worse Than Cyberwar Itself?
Unrealistic cyberwar expectations could hold the insurance industry back, and that’s the real economic security problem. The “hyperbolic characterization of cyberwar is likely a bigger problem than the threat of cyberwar itself. The problem is one of economic security,” Tom Johansmeyer writes.
-
-
Quantum-Safe Cryptography
Cryptography researchers have created an algorithm that can help strengthen online transactions that use end-to-end encryption against powerful attacks from quantum computers.
-
-
Fact Check: AI Fakes in Israel's War Against Hamas
Real or fake? Images generated by artificial intelligence have become a disinformation tool in the war between Israel and Hamas. DW’s fact-checking team shows you how to spot them.
-
-
From ********* to EZacces$! Your Browser Extension Could Grab Your Password and Sensitive Info
When you type a password or credit card number into a website, you expect that your sensitive data will be protected by a system designed to keep it secure. That’s not always the case.
-
-
It’s Not Just About Facts: Democrats and Republicans Have Sharply Different Attitudes About Removing Misinformation from Social Media
Misinformation is a key global threat, but Democrats and Republicans disagree about how to address the problem. In particular, Democrats and Republicans diverge sharply on removing misinformation from social media.
-
-
UVA Engineering Researcher Has Plan to Defeat the Next Big Cyberattack
“Zero-day attacks” are the cyberattacks that disable large-scale computer programs, catching their victims off guard. In recent years, they’ve been happening more often and have become increasingly difficult to fix. From zero-day to ransomeware attacks, UVA’s Ashish Venkat believes cybersecurity should be fast and affordable for all.
-
-
Want to Prevent Misinformation? Present Data with an Interactive Visual
Getting readers of a news story interested in numbers can be a challenge. But the benefits of engaging readers in data can lead to a better understanding, preventing misinformation, and misrepresentation in the news. New research explores a solution using interactive data visualization to inform and engage readers.
-
-
EPA Cancels Certain Cyber Regulations for Water Utilities
Following growing concerns about the cybersecurity of the U.S. water infrastructure, the EPA announced this week it will no longer require cybersecurity audits of water utility facilities through sanitary surveys.
-
More headlines
The long view
Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters
Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.
Fake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
Building Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
Researchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI
Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.
