-
Foreign Disinformation Effort Raises Fears of Violence in U.S.
Foreign intelligence services and global terrorist organizations are engaged in a broad effort to seed the United States with disinformation, and this effort appears to be working, raising new fears of a terrorist attack in the coming weeks, according to a senior DHS official.
-
-
Antisemitism Disseminated Across Social Media Platforms
Gab, a self-described “free speech” platform, has a long history as a haven for antisemites, extremists and conspiracy theorists. On Gab, and on Gab’s Twitter account, extremists promote a range of antisemitic tropes, such as Jews having dual loyalty to the U.S. and Israel, that Jews are to blame for the crucifixion of Jesus and that Jews control the U.S. government.
-
-
Hate Speech on Social Media Fueled By Users’ Shared Values, Moral Concerns
People whose moral beliefs and values align closely with other members of their online communities — including those on social networks Gab and Reddit — are more prone to radicalization, according to new research.
-
-
Finding Clues to Why False News Snowballs on Social Media
The spread of misinformation on social media is a pressing societal problem that tech companies and policymakers continue to grapple with. But why and how does false news spread? A new model shows that the more polarized and hyperconnected a social network is, the more likely misinformation will spread.
-
-
Information Disorder: A Crisis That Exacerbates All Other Crises
The Aspen Institute has issued a report analyzing the dangers of truth decay – the report’s authors prefer the term “information disorder” — and making a number of recommendations. In their introductory remarks, the authors write that “Information disorder is a crisis that exacerbates all other crises. When bad information becomes as prevalent, persuasive, and persistent as good information, it creates a chain reaction of harm.”
-
-
What's the Deal with the Log4Shell Security Nightmare?
What started out as a Minecraft prank, has now resulted in a 5-alarm security panic as administrators and developers around the world desperately try to fix and patch systems before the cryptocurrency miners, ransomware attackers and nation-state adversaries rush to exploit thousands of software packages. Nicholas Weaver writes that “Not only does the vulnerability affect thousands of programs but the exploitation of this vulnerability is very straightforward. Attackers are already starting to launch widespread attacks. Further compounding the problem is the huge diversity of vulnerable systems, so those responsible for defending systems are going to have a very bad Christmas.”
-
-
Jabbed in the Back: Russian, Chinese COVID-19 Disinformation Campaigns
The public health and economic consequences of the COVID-19 pandemic have also become a battle about the nature of truth itself. From the emergence of the first reports of a virus in Wuhan, China, in December 2019, opportunistic leaders in China, Russia, and elsewhere have used the virus as a pretext to further erode democracy and wage information warfare. They have inundated an already polluted information environment with disinformation and propaganda about the virus’s origins and cures, and, most recently, vaccines.
-
-
How China Could Cyberattack Taiwan
China has the means to launch a disabling cyberattack against political rival Taiwan ahead of any military invasion, experts say, as the technology is already targeting the island’s political leadership. A straight-up military invasion would cost lives and mobilize U.S. forces for Taiwan’s defense. Disruptive cyberattacks could sow chaos and soften Taiwan’s defenses, potentially making an invasion less costly for Beijing, experts say.
-
-
New Cyber Protections against Stealthy “Logic Bombs”
Cybersecurity researchers proposed new ways to protect 3D printed objects such as drones, prostheses, and medical devices from stealthy “logic bombs.”
-
-
Gait Authentication to Enhance Smartphone Security
Real-world tests have shown that gait authentication could be a viable means of protecting smartphones and other mobile devices from cyber crime. A study showed that a method sensing an individual’s gait was on average around 85 percent accurate in recognizing the individual.
-
-
Viral Vendettas: Pandemic-Driven Growth of Online Conspiratorial Movements
Graphika has just released a new report which tracks the growth of conspiratorial movements online throughout the course of the Covid-19 pandemic, seeking to understand how these communities have evolved, and to what extent they have enabled real-world and online harms.
-
-
Detecting Malicious Broadcast Receivers
The Android operating system has a large share of the mobile market and as such is a target for malware creators and other third parties who would manipulate the system for personal gain. So how might we enhance the detection of malware on the Android operating system commonly used to run mobile phones and tablets?
-
-
Using Math to Prove Computer Security
An academic mathematician thought maths was boring, but he now relies on it to secure critical systems like those of the Australian Department of Defense against hackers.
-
-
Simple and Efficient Method of Quantum Encryption
Quantum computers will revolutionize our computing lives. But these computers will be able to crack most of the encryption codes currently used to protect our data, leaving our bank and security information vulnerable to attacks
-
-
Boosting Resilience of U.S. Timekeeping
The U.S. should bolster research and development of systems that distribute accurate time via fiber-optic cable and radio as part of the effort to back up GPS and enhance the resilience of critical infrastructure that depends on it.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
By John Tucker
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.