-
Cybersecurity Professionals May Be Burning Out at a Faster Rate Than Frontline Health Care
More attention should be paid to the fast rate of burn-out among cybersecurity professionals. Hundreds of thousands of cybersecurity jobs are vacant owing to lack of cybersecurity talent – and that number is growing, among other things, by thousands of cybersecurity professionals who leave the field after a few short years.
-
-
DHS Unveils New Cybersecurity Performance Goals for Critical Infrastructure
DHS released the Cybersecurity Performance Goals (CPGs), voluntary practices that outline the highest-priority baseline measures businesses and critical infrastructure owners of all sizes can take to protect themselves against cyber threats.
-
-
Ensuring Our Workforce Is Cyber Ready
Remaining vigilant and prepared to protect our nation’s cybersecurity is one of DHS S&T’s highest priorities. To meet this goal, S&T is harnessing the intellectual power of America’s universities and leveraging some of the best and brightest subject matter experts and academic minds via S&T Centers of Excellence (COE).
-
-
Extracting Personal Information from Anonymous Cell Phone Data
Researchers haves extracted personal information, specifically protected characteristics like age and gender, from anonymous cell phone data using machine learning and artificial intelligence algorithms, raising questions about data security.
-
-
Improving Recovery of Critical Systems after Cyberattacks
Researchers aim to develop fast, accurate and efficient recovery mechanisms that, when coupled with the expeditious damage assessment techniques he has already developed, will offer an “integrated suite solution.” This will allow affected CI systems to continue running while providing as many critical functionalities as possible.
-
-
Nobel-Winning Quantum Weirdness Undergirds an Emerging High-Tech Industry, Promising Better Ways of Encrypting Communications and Imaging Your Body
There are several emerging technologies which rely on the non-intuitive quantum phenomenon of entanglement: Unhackable communications devices, high-precision GPS and high-resolution medical imaging. For the most part, quantum entanglement is still a subject of physics research, but it’s also a component of commercially available technologies, and it plays a starring role in the emerging quantum information processing industry.
-
-
Ukraine Warns of Looming Russian Cyberattacks
Ukraine is again urging its companies and private organizations to immediately bolster their cybersecurity ahead of what could be a new wave of Russian attacks. The government advisory further warned that the vulnerabilities could allow Russia to launch a renewed series of targeted cyberattacks on Ukraine aimed at disabling communication and information systems.
-
-
How Can Countries Protect Critical Infrastructure from Cyberattacks?
Hacking attacks on power grids, telecom networks, or governments can paralyze entire societies. That makes them a powerful military weapon, as the war in Ukraine demonstrates. How can countries protect themselves?
-
-
Thinking Like a Cyberattacker to Protect User Data
A component of computer processors that connects different parts of the chip can be exploited by malicious agents who seek to steal secret information from programs running on the computer. Researchers develop defense mechanisms against attacks targeting interconnection of chips in computers.
-
-
Violent Extremist Music Prevalent on Spotify, While Platform Largely Declines to Act
Music has long been an effective way to radicalize extremists, allowing artists to both entertain and indoctrinate vulnerable listeners. Researchers have identified 40 racially or ethnically motivated violent extremist (RMVE) artists with a presence on Spotify, the world’s largest music streaming platform.
-
-
Fighting Foreign Interference
Many in Europe did not take the foreign interference threat seriously until Russia launched its war against Ukraine on 24 February, even though European nations were already subjected to a form of hybrid warfare from Russia with cyberattacks on hospitals during the Covid-19 pandemic, attacks on public institutions, attempts to corrupt leaders and financing of political parties. China’s emerging interference campaign emulates Russia’s. Their goal is :to ensure the democracies no longer functioned and gave way to authoritarian regimes,” says a European expert.
-
-
Majority of Posts on Extremist Online Forums Made by “Hyper” Poster Cliques
Most posts in extremist online forums are made by a clique of particularly committed members, a major new study shows. An analysis of the chatrooms have also discovered they have identical participation structures.
-
-
More Governments Use Spyware to Monitor Their People, Compromising Privacy
The right to privacy is under siege as an increasing number of governments are using spyware to keep tabs on their people. Many governments are using modern digital networked technologies to monitor, control and oppress their populations.
-
-
EFF’s “Cover Your Tracks” Will Detect Your Use of iOS 16’s Lockdown Mode
Apple’s new iOS 16 offers a powerful tool for its most vulnerable users. Lockdown Mode reduces the avenues attackers have to hack into users’ phones by disabling certain often-exploited features. But there is a catch.
-
-
A Retrospective Post-Quantum Policy Problem
In May 2022, a White House memorandum warned that a quantum computer of sufficient size and sophistication will be capable of breaking much of the public-key cryptography used on digital systems across the United States and around the world. The various steps taken by the administration, and proposed by lawmakers, to deal with the problem are all forward-looking. “However, despite these efforts, policymakers have given little or no attention to what could be called a retrospectivepost-quantum problem,” Herb Lin writes. “Policymakers would be wise to consider the very real possibility that in a PQC[post-quantum computing] world, messages they once believed would be kept secret could in fact be made public.”
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.