-
When Hurricanes Strike, Social Media Can Save Lives
Social media can be a powerful tool for cities to communicate and to collect information to deploy emergency resources where needed most.
-
-
Identifying and Predicting Insider Threats
Insider threats are one of the top security concerns facing large organizations. Current and former employees, business partners, contractors—anyone with the right level of access to a company’s data—can pose a threat. A new project seeks to detect and predict insider threats.
-
-
Food Production Vulnerable to Cyberattacks
Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.
-
-
S&T Hackathon: Thwarting Emerging Threats to Critical Infrastructure
Threats against the U.S. critical infrastructure are not new—physical threats and natural disasters have challenged the U.S. critical infrastructure and their support systems time and time again. But the rapid development of new information and communication technologies, and their inevitable integration the into the U.S. critical infrastructure, bring with them the possibility of digital attacks and other new challenges that the United States must be ready to face.
-
-
Bad for Computer Security: Employees Returning to the Office
When employees feel they deserve superior technology compared to other employees—and they don’t receive unrestricted access to it—they pose a security risk to their companies, according to a new research.
-
-
Buffalo Attack Footage Spread Quickly Across Platforms, Has Been Online for Days
The livestream of the accused Buffalo shooter’s deadly attack at a Buffalo supermarket was available briefly via Twitch, but the footage spread quickly across online platforms, and remains online for public consumption.
-
-
Faster Ransomware Detection
Ransomware extortion is hugely expensive, and instances of ransomware extortion are on the rise. The FBI reports receiving 3,729 ransomware complaints in 2021, with costs of more than $49 million. What’s more, 649 of those complaints were from organizations classified as critical infrastructure.
-
-
New Method Kills Cyberattacks in Less Than a Second
Researchers, using artificial intelligence, new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second.
-
-
How to Avoid Extremism on Social Media
The internet has been a haven for extremists since long before most people even knew it existed. Today, extremists share their likes and tweet their thoughts like everyone else. But they have also spun off into an ever-widening array of social media sites with greater appetites for hateful words and violent images.
-
-
IBM, Historically Black Colleges Partner to Tackle Cybersecurity Talent Shortage
In 2020, the talent shortage in the U.S. has more than tripled over ten years, with 69 percent of employers surveyed struggling to fill skilled positions. By September 2021, there were more than 1.2 million U.S. job vacancies postings in software-related professions. IBM joins with Historically Black Colleges & Universities to launch cybersecurity degree programs.
-
-
Encouraging Individuals to Take Action Against Truth Decay
Facts and analysis are playing a diminishing role in American public life—a phenomenon called Truth Decay—so RAND is launching a public information campaign on social media to build understanding of Truth Decay and how individuals can tackle it by scrutinizing information they believe and share.
-
-
Fact Checks Effectively Counter COVID Misinformation
New study finds that journalistic fact checks are a more effective counter to COVID-19 misinformation than the false news tags commonly used by social media outlets. “We find that more information may be an antidote to misinformation,” conclude the authors of the study.
-
-
How Destructive Is a DDoS Cyberattack?
Last weekend, Russian hackers attacked several German government websites. These cyberattacks were seemingly harmless, much to the relief of the authorities. But many others are not so lucky.
-
-
Undetected and Dormant: Managing Australia’s Software Security Threat
At the same time as software has become integral to our prosperity and national security, attacks on software supply chains are on the rise. Software supply chain attacks are popular, can have a big impact and are used to great effect by a range of cyber adversaries.
-
-
DHS’s ‘Disinformation Governance Board’ Assailed by Lawmakers
A proposed new DHS working group focusing on countering disinformation has run into a buzzsaw of opposition from members of Congress. Some have characterized the would-be Disinformation Governance Board as an Orwellian body threating free speech. DHS Secretary Alejandro Mayorkas, in a congressional hearing, scrambled to defend the new board.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.