-
Latest Reasoning Models from OpenAI to Be Used for Energy and National Security Applications on Los Alamos’s Venado Supercomputer
Los Alamos National Laboratory has entered a partnership with OpenAI to install its latest o-series models — capable of expert reasoning for a broad span of complex scientific problems — on the Lab’s Venado supercomputer.
-
-
Experts Explain Signal, Cybersecurity, and How a Journalist Was Sent High-Level Military Intelligence
“The practice of not using SCIFs (Secure Compartmented Information Facilities) for the planning and implementation of conflict with a foreign state is an egregious breach of national security protocols,” said Virginia Tech’s cybersecurity expert Aron Brantly. “That the principals group was using this as a means of communications is a profound violation of US classification laws and standards and constitutes a grave threat to U.S. national security.”
-
-
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
-
-
Israeli Startup Raises $50m to Stop App-Based Cyberattacks
Oligo Security’s platform allows for quick identification of vulnerabilities in cloud-native software before they are exploited by third parties.
-
-
Standardized Security Playbooks Improve Protection Against Cyberattacks
Each company relies on its own security concepts and devises its playbooks individually. This means hardly any security-related information is shared between these organizations. And that is a problem, especially when business partners regularly exchange data, as is the case with industrial firms and their suppliers.
-
-
A Win for Encryption: France Rejects Backdoor Mandate
In a moment of clarity after initially moving forward a deeply flawed piece of legislation, the French National Assembly has done the right thing: it rejected a dangerous proposal that would have gutted end-to-end encryption in the name of fighting drug trafficking.
-
-
Security Scheme Could Protect Sensitive Data During Cloud Computation
MIT researchers crafted a new approach that could allow anyone to run operations on encrypted data without decrypting it first.
-
-
South Korea Has Acted Decisively on DeepSeek. Other Countries Must Stop Hesitating
South Korea has suspended new downloads of DeepSeek, and it was right to do so. Chinese tech firms operate under the shadow of state influence, misusing data for surveillance and geopolitical advantage. Any country that values its data and sovereignty must watch this national security threat and take note of South Korea’s response.
-
-
The Rise and Fall of Terrorgram: Inside a Global Online Hate Network
White supremacists from around the world used Telegram to spread hateful content promoting murder and destruction in a community they called Terrorgram. ProPublica and FRONTLINE identified 35 crimes linked to Terrorgram, including bomb plots, stabbings, and shootings. After several arrests of alleged Terrorgram members and reforms by Telegram, experts expect that extremists will find a new platform for their hate.
-
-
How a Global Online Network of White Supremacists Groomed a Teen to Kill
Neo-Nazi influencers on the social media platform Telegram created a network of chats and channels where they stoked racist, antisemitic and homophobic hate. The influencers, known as the Terrorgram Collective, targeted a teen in Slovakia and groomed him for three years to kill.
-
-
Trump Is Giving Russian Cyber Ops a Free Pass – and Putting Western Democracy on the Line
Secretary of Defense Pete Hegseth last weekend announced that the U.S. will halt all offensive cyber operations –and planning for such operations –against Russia. The Kremlin has long sought to sow chaos in the United States and other democracies by using “information confrontation.” That job just got a lot easier.
-
-
In Case We Forgot, Typhoon Attacks Remind Us of China’s Cyber Capability—and Intent
The Salt Typhoon incident reminds us that China has the intent, and increasingly the capability, to seriously challenge US and Western technology advantage.
-
-
DOGE Threat: How Government Data Would Give an AI Company Extraordinary Power
The Department of Government Efficiency, or DOGE, has secured unprecedented access to at least seven sensitive federal databases. Since information is power, concentrating unprecedented data in the hands of a private entity with an explicit political agenda represents a profound challenge to the republic. I believe that the question is whether the American people can stand up to the potentially democracy-shattering corruption such a concentration would enable. If not, Americans should prepare to become digital subjects rather than human citizens.
-
-
Cornered by the UK’s Demand for an Encryption Backdoor, Apple Turns Off Its Strongest Security Setting
In response to the U.K. demands for a backdoor, Apple has stopped offering users in the U.K. Advanced Data Protection, an optional feature in iCloud that turns on end-to-end encryption for files, backups, and more.
-
-
Election Officials Blast Trump’s “Retreat” from Protecting Voting Against Foreign Threats
The Trump administration has begun dismantling the nation’s defenses against foreign interference in voting, a sweeping retreat that has alarmed state and local election officials. The administration is shuttering the FBI’s Foreign Influence Task Force and last week cut more than 100 positions at the U.S. Cybersecurity and Infrastructure Security Agency.
-
More headlines
The long view
What Does Netflix’s Drama “Adolescence” Tell Us About Incels and the Manosphere?
While Netflix’s psychological crime drama ‘Adolescence’ is a work of fiction, its themes offer insight into the very real and troubling rise of the incel and manosphere culture online.
Confronting Core Problems in Cybersecurity
It’s common for governors and mayors to declare a state of emergency and activate the National Guard in the aftermath of hurricanes, tornadoes, and other natural disasters. But last month, officials in Minnesota took these steps in the wake of a major cyberattack on the city of St. Paul —a testament to how disruptive these attacks have become.
Voting from Your Sofa Is Secure Enough – but Will It Be Allowed?
A new electronic voting system developed at NTNU can withstand attacks from quantum computers, meaning digital elections can be conducted securely, even in the future.