• The Risk of Russian Cyber Retaliation for the United States Sending Rockets to Ukraine

    U.S. rocket shipments to Ukraine will not trigger Russian cyberattacks against the United States. Russian is too focused on attacking Ukrainian systems and defending their own networks to mount a response to the weapons shipments.

  • Can Reforming Social Media Save American Democracy?

    When social media exploded in the mid-2000s, retweeting, sharing and liking posts appeared to give average citizens the power to share their opinions far and wide. The problem, according to social psychologist Jonathan Haidt, is that online social networks didn’t really end up giving everyone the voice that many thought it would. “It empowered four groups who take advantage of the viral dynamics of social media. That is the far right, the far left, trolls and Russian intelligence,” he says.

  • “Hacking” Solutions for Pressing Cybersecurity Challenges

    When people think about the game capture the flag, memories of gym class or family trips likely come to mind. Researchers are participating in a slightly different version of this childhood favorite, where teams face off against opponents across the world to tackle real-world cybersecurity issues. 

  • Cybersecurity Tools to Protect Solar, Wind Power on the Grid

    Solar panels and wind turbines are projected to produce 44% of America’s electricity by 2050, but they present cybersecurity challenges. They have sensors, controllers, actuators or inverters which are directly or indirectly connected to the internet using insecure connectivity to legacy electric grid systems. They have complex physics. They’re subject to advanced persistent threats. And there will be more and more of them going online.

  • Al-Shabaab and the Islamic State Networks on Facebook 

    Researchers found that the network of support on social media for al-Shabaab and Islamic State extended across several platforms, including decentralized messaging applications such as Element and RocketChat, and encrypted messaging platforms such as Telegram, as well as Twitter, YouTube and Facebook. 

  • Stronger Security for Smart Devices

    Researchers are pushing to outpace hackers and develop stronger protections that keep data safe from malicious agents who would steal information by eavesdropping on smart devices. The researchers have demonstrated two security methods that efficiently protect analog-to-digital converters from powerful attacks that aim to steal user data.

  • Five Cybersecurity Challenges Beyond Technology

    The data are clear: cyberattacks have been on the rise in recent years and the cybersecurity situation is increasingly complex. More than 90% of cyberattacks are made possible, to a greater or lesser extent, by human error.

  • Keeping Web-Browsing Data Safe from Hackers

    Studying a powerful type of cyberattack, researchers identified a flaw in how it’s been analyzed before, then developed new techniques that stop it in its tracks.

  • Randomly Moving Electrons Can Improve Cybersecurity

    Researchers have developed a record-breaking true random number generator (TRNG), which can improve data encryption and provide improved security for sensitive digital data such as credit card details, passwords and other personal information.

  • Who Cares about a Midterm Election? Comparing Russia, Iran, and China’s Electoral Interference from Past to Present

    Midterm elections present a complicated target environment for foreign manipulators because, unlike presidential elections, there is no single candidate who can significantly alter U.S. foreign policy. But interference opportunities remain, and adversaries have the potential to advance their strategic objectives through a campaign meant to create further turbulence within U.S. democracy.

  • Secure Communication with Light Particles

    Quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Researchers have developed a new, tap-proof communication network.

  • Operational Protection of Water Infrastructure Against Cyber-Physical Threats

    As the water supply system becomes more digitalized, cyberthreats are increasing. It is time for an all-hazard risk management and mitigation system.

  • A Quarter of World's Internet Users Rely on Infrastructure Highly Vulnerable to Attack

    About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South.

  • Quantum Drone Offers Unrivaled Security

    Harnessing the laws of nature – namely quantum physics – a cutting-edge teleportation technology is taking cybersecurity to new, “unhackable” heights using miniscule particles of light or “beams.”

  • Inside the Government Fiasco That Nearly Closed the U.S. Air System

    The upgrade to 5G was supposed to bring a paradise of speedy wireless. But a chaotic process under the Trump administration, allowed to fester by the Biden administration, turned it into an epic disaster. The problems haven’t been solved.