-
Perfectly Secure Digital Communications
Researchers have achieved a breakthrough in secure communications by developing an algorithm that conceals sensitive information so effectively that it is impossible to detect that anything has been hidden.
-
-
Understanding Antisemitism on Twitter After Musk
New research has found a major and sustained spike in antisemitic posts on Twitter since the company’s takeover by Elon Musk on October 27, 2022. Researchers found that the volume of English-language antisemitic tweets more than doubled in the period following Musk’s takeover.
-
-
Extremist Propaganda Soars to All-Time High in 2022
In 2022, there has been a significant increase in racially or ethnically motivated violent extremist (RMVE) propaganda efforts, which included the distribution of racist and antisemitic fliers, stickers, banners, graffiti, and posters, as well as laser projections - with a total of 6,751 cases reported in 2022, compared to 4,876 in 2021.
-
-
Expanding the AI Toolbox of Cybersecurity Defenders
Scientists have taken a key step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks. DRL shows the promise of an autonomous AI in proactive cyber defense.
-
-
Russian Cyberattacks on U.S. Likely to Become Bolder, More Brazen
Repeated failures by Russian cyberattacks and disinformation campaigns to inflict lasting damage during the Kremlin’s ongoing war against Ukraine is unlikely to dampen Moscow’s resolve and could instead spur a new wave of riskier efforts against a wider set of targets.
-
-
U.S. Unveils Aggressive National Cybersecurity Strategy
The Biden administration is pushing for more comprehensive federal regulations to keep the online realm safer against hackers, including by shifting cybersecurity responsibilities away from consumers to industry and treating ransomware attacks as national security threats.
-
-
Security Vulnerabilities Detected in Drones Made by DJI
Researchers have detected security vulnerabilities, some of them serious, in several drones made by the manufacturer DJI. These enable users, for example, to change a drone’s serial number or override the mechanisms that allow security authorities to track the drones and their pilots. In special attack scenarios, the drones can even be brought down remotely in flight.
-
-
Digital Twins Could Protect Manufacturers from Cyberattacks
Detailed virtual copies of physical objects, called digital twins, hold the promise of better products across automotive, health care, aerospace and other industries. According to a new study, cybersecurity may also fit neatly into the digital twin portfolio.
-
-
Can a Cyber shuffle Stop Hackers from Taking Over a Military Aircraft?
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers to take control of a military jet, commercial airliner or spacecraft. Sandia, Purdue team up to test cyberdefense against an algorithm trained to break it.
-
-
How One of the World's Most Popular Open-Source Security Monitoring Platforms Was Developed
A tool from the internet’s early days keeps Microsoft’s users secure while supporting the open-source paradigm.
-
-
5 Key Takeaways from State of Antisemitism in America Report 2022
For too many American Jews, being Jewish no longer feels as safe as it once did. And the younger those American Jews are, the more they experience that threat firsthand.
-
-
Americans’ Trust in News Continues to Decline – but Local News Are Much More Trusted Than National News
A new study explores the disconnect between newsrooms’ efforts to rebuild the public’s trust and the continued decline of confidence in that effort. The study distinguishes between the practical and emotional dimensions of trust, and finds that that more than twice as many Americans have higher emotional trust in local news than in national news.
-
-
Winners and Losers in the Russia–Ukraine Cyberwar
Much of the focus has been on the kinetic war in Ukraine, but the cyber conflict has also continued unabated with both sides engaged in a variety of maneuvers, from attacks on critical infrastructure to spreading misinformation. Along the way, a number of existing preconceptions about cyber conflict in an active war scenario have been upended —chief among them was the expectation that cyber attacks would play a decisive part in the conflict and that Russia would dominate in this domain.
-
-
Is China’s Huawei a Threat to U.S. National Security?
The Chinese telecommunications company, a world leader in 5G technology and smartphones, faces accusations that the Chinese intelligence services can use – and have used — its 5G infrastructure for espionage. The U.S. and other Western countries have effectively banned Huawei from building their 5G networks, but it remains popular in low-income countries. The outcome of the struggle could shape the world’s tech landscape for years to come.
-
-
NIST Selects ‘Lightweight Cryptography’ Algorithms to Protect Small Devices
The algorithms are designed to protect data created and transmitted by the Internet of Things and other small electronics.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.