-
Multitasking Raises Risk of Phishing
In the information age, multitasking is often worn as a badge of honor. But according to new research, multitasking may also blind us to hidden threats, thereby increasing our chances of falling victim to cybercrime.
-
-
Market Incentives and Cybersecurity: Fixing the Broken System Before It Breaks Us
Cybersecurity is not just an IT issue; it is a shared responsibility and an economic imperative. Only by ensuring resilience can we confidently adopt new technology and realize its benefits. The next horizon of the cyber security strategy would require a mix of incentives—including regulation, market forces and cultural change—to realize the objective of building a secure and resilient digital economy.
-
-
Power-Outage Exercises Strengthen the Resilience of U.S. Bases
In recent years, power outages caused by extreme weather or substation attacks have exposed the vulnerability of the electric grid. Now mandated by law, Lincoln Laboratory’s blackout drills are improving national security and ensuring mission readiness.
-
-
Computer Scientists Boost U.S. Cybersecurity
As cyber threats grow more sophisticated by the day, researchers are making computing safer thanks to federally funded research that targets some of the internet’s most pressing security challenges.
-
-
Robustly Detecting Sneaky Cyberattacks That Might Throw AI Spacecraft Off-Course
Cyberattacks on future, AI-guided spacecraft could be thwarted by unpicking what the AI has been “thinking.”
-
-
Cybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams
Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams. Study involving 19,500 UC San Diego Health employees evaluated the effectiveness of two different types of cybersecurity training.
-
-
Influencers, Multipliers, and the Structure of Polarization: How Political Narratives Circulate on Twitter/X
A recent study provides a nuanced understanding of the mechanisms driving polarization and issue alignment on Twitter/X and reveals how political polarization is reinforced and structured by two distinct types of highly active users: influencers and multipliers.
-
-
Protecting the Grid with Artificial Intelligence
The electric grid powers everything from traffic lights to pharmacy fridges, but it regularly faces threats from severe storms and advanced attackers. New neural network detects physical issues, cyberattacks.
-
-
Hashtags and Humor Are Used to Spread Extreme Content on Social Media
Conspiracy theories and incitement to harassment and violence abound on mainstream social media platforms like Facebook and Instagram. But the extreme content is often mixed with ironic play, memes and hashtags, which makes it difficult for authorities and media to know how to respond.
-
-
Large Language Models Can Execute Complete Ransomware Attacks Autonomously
Study demonstrates AI systems can carry out full attack campaigns, a warning to cybersecurity defenders.
-
-
How AI Can Ease Workloads for Frontline Cybersecurity Teams
A 10-month trial has shown how large language models can assist cybersecurity analysts during live cyberthreat investigations to boost productivity and trust.
-
-
Codemakers Race to Secure the Internet as Quantum Threat Looms
With quantum computing on the horizon, cryptographers are working to secure digital communications against a new generation of potential threats.
-
-
Voting from Your Sofa Is Secure Enough – but Will It Be Allowed?
A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.
-
-
Australia’s Deepfake Dilemma and the Danish Solution
Countries need to move beyond simply pleading with internet platforms for better content moderation and instead implement new legal frameworks that empower citizens directly. For a model of how to achieve this, policymakers should look to the innovative legal thinking emerging from Denmark.
-
-
Digital Siege Puts Taiwan’s Resilience to the Test
The most sustained conflict unfolding between China and Taiwan is not taking place on the water or in the air; it is happening in cyberspace.
-
More headlines
The long view
Hacking the Grid: How Digital Sabotage Turns Infrastructure into a Weapon
The darkness that swept over the Venezuelan capital in the predawn hours of Jan. 3, 2026, signaled a profound shift in the nature of modern conflict: the convergence of physical and cyber warfare. The blackout was the result of a precise and invisible manipulation of the industrial control systems that manage the flow of electricity. This synchronization of traditional military action with advanced cyber warfare represents a new chapter in international conflict, one where lines of computer code that manipulate critical infrastructure are among the most potent weapons.
Entity Resolution: The Security Technology You Probably Haven’t Heard Of
The concept “entity resolution” (ER) is probably unfamiliar, but it underpins much of the world’s security—in telecommunications, banking and national security.
