-
Al-Shabaab and the Islamic State Networks on Facebook
Researchers found that the network of support on social media for al-Shabaab and Islamic State extended across several platforms, including decentralized messaging applications such as Element and RocketChat, and encrypted messaging platforms such as Telegram, as well as Twitter, YouTube and Facebook.
-
-
Stronger Security for Smart Devices
Researchers are pushing to outpace hackers and develop stronger protections that keep data safe from malicious agents who would steal information by eavesdropping on smart devices. The researchers have demonstrated two security methods that efficiently protect analog-to-digital converters from powerful attacks that aim to steal user data.
-
-
Five Cybersecurity Challenges Beyond Technology
The data are clear: cyberattacks have been on the rise in recent years and the cybersecurity situation is increasingly complex. More than 90% of cyberattacks are made possible, to a greater or lesser extent, by human error.
-
-
Keeping Web-Browsing Data Safe from Hackers
Studying a powerful type of cyberattack, researchers identified a flaw in how it’s been analyzed before, then developed new techniques that stop it in its tracks.
-
-
Randomly Moving Electrons Can Improve Cybersecurity
Researchers have developed a record-breaking true random number generator (TRNG), which can improve data encryption and provide improved security for sensitive digital data such as credit card details, passwords and other personal information.
-
-
Who Cares about a Midterm Election? Comparing Russia, Iran, and China’s Electoral Interference from Past to Present
Midterm elections present a complicated target environment for foreign manipulators because, unlike presidential elections, there is no single candidate who can significantly alter U.S. foreign policy. But interference opportunities remain, and adversaries have the potential to advance their strategic objectives through a campaign meant to create further turbulence within U.S. democracy.
-
-
Secure Communication with Light Particles
Quantum computers offer many novel possibilities, they also pose a threat to internet security since these supercomputers make common encryption methods vulnerable. Researchers have developed a new, tap-proof communication network.
-
-
Operational Protection of Water Infrastructure Against Cyber-Physical Threats
As the water supply system becomes more digitalized, cyberthreats are increasing. It is time for an all-hazard risk management and mitigation system.
-
-
A Quarter of World's Internet Users Rely on Infrastructure Highly Vulnerable to Attack
About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South.
-
-
Quantum Drone Offers Unrivaled Security
Harnessing the laws of nature – namely quantum physics – a cutting-edge teleportation technology is taking cybersecurity to new, “unhackable” heights using miniscule particles of light or “beams.”
-
-
Inside the Government Fiasco That Nearly Closed the U.S. Air System
The upgrade to 5G was supposed to bring a paradise of speedy wireless. But a chaotic process under the Trump administration, allowed to fester by the Biden administration, turned it into an epic disaster. The problems haven’t been solved.
-
-
When Hurricanes Strike, Social Media Can Save Lives
Social media can be a powerful tool for cities to communicate and to collect information to deploy emergency resources where needed most.
-
-
Identifying and Predicting Insider Threats
Insider threats are one of the top security concerns facing large organizations. Current and former employees, business partners, contractors—anyone with the right level of access to a company’s data—can pose a threat. A new project seeks to detect and predict insider threats.
-
-
Food Production Vulnerable to Cyberattacks
Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.
-
-
S&T Hackathon: Thwarting Emerging Threats to Critical Infrastructure
Threats against the U.S. critical infrastructure are not new—physical threats and natural disasters have challenged the U.S. critical infrastructure and their support systems time and time again. But the rapid development of new information and communication technologies, and their inevitable integration the into the U.S. critical infrastructure, bring with them the possibility of digital attacks and other new challenges that the United States must be ready to face.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.