-
Targeted: Masterminds of Global Ransomware Attacks Against Critical Infrastructure
Twelve individuals who were wreaking havoc across the world with ransomware attacks against critical infrastructure have been targeted as the result of a law enforcement and judicial operation involving eight countries.
-
-
Distributed Protocol Underpinning Cloud Computing Automatically Determined Safe and Secure
Two researchers have debunked the common assumption that the famous Paxos consensus protocol is too complex to be proven safe without hours of manual labor.
-
-
Protecting Hardware from Software Attacks
In order to break the endless cycle of software patch-and-pray, DARPA’s System Security Integration Through Hardware and firmware (SSITH) program aims to develop ASIC hardware with novel protections proven in mitigating against software attacks on hardware.
-
-
Misinformation on Stem Cell Treatments for COVID-19 Linked to Overhyped Science: Researchers
Researchers call for stronger regulations to deter the sale of unproven cell-based products, and more responsible and accurate science communication.
-
-
Why Do the Russian and Chinese Governments Want Americans to Dislike Immigrants?
The Internet Research Agency (IRA), the Kremlin’s propaganda and disinformation arm, employs fake social media accounts, media properties, memes, and bots to conduct what the Russians call “active measures” campaign to influence U.S. public opinion. The IRA’s goal is to intensify political opinions on every issue, and one of the IRA’s prime targets is to deepen nativist sentiments among Americans.
-
-
CISA, FBI, NSA Release BlackMatter Ransomware Advisory
CISA, the FBI, and the NSA published a cybersecurity advisory regarding BlackMatter ransomware cyber intrusions targeting multiple U.S. critical infrastructure entities, including two U.S. food and agriculture sector organizations.
-
-
Is There Such a Thing as a Safe Algorithm? Talk of Regulation Gathers Momentum
There is now wide agreement among experts and politicians that regulatory changes are needed to protect users, particularly young children and girls, who are vulnerable to mental health problems and body image issues that are tied to the social media platform’s algorithms.
-
-
U.S. Leads Global Conference to Combat Ransomware Attacks
The White House is holding a two-day international conference starting Wednesday to combat ransomware computer attacks on business operations across the globe that cost companies, schools and health services an estimated $74 billion in damages last year.
-
-
“Self-Aware' Algorithm Wards Off Hacking Attempts
In 2010, the Stuxnet virus was used to damage nuclear centrifuges in Iran. Researchers have come up with a powerful response: to make the computer models that run these cyberphysical systems both self-aware and self-healing.
-
-
New Method to Extract and Separate Rare Earth Elements
A new method improves the extraction and separation of rare earth elements from unconventional sources. The method could help develop a domestic supply of rare earth metals from industrial waste and electronics due to be recycled.
-
-
U.S. Unveils New Cybersecurity Requirements for Rail, Air
DHS has unveiled new measures to make sure the U.S. air and surface transportation sectors will not be crippled by ransomware or cyberattacks. The new measures will apply to “higher risk” rail companies, “critical” airport operators, and air passenger and air cargo companies.
-
-
More Violent Pro-ISIS, Extreme Right Content on Facebook & Instagram
The Counter Extremism Project (CEP), which monitors the methods used by extremists to exploit the Internet and social media platforms to recruit followers and incite violence, reports that violent Islamist and extreme right content continues to be available on social media platforms.
-
-
Hacking for Homeland Security
On Monday (4 September), the Department of Homeland Security (DHS) announced the launch of the third Hacking for Homeland Security (H4HS). Participating students will focus on challenges associated with cybersecurity information sharing within transportation, the latency issue at screening checkpoints, and address greenspace issues after natural disasters.
-
-
Only Playing: Extreme-Right Gamification
Extremist ideas inspire violence in a few, but for the many, participation increasingly resembles a consequence-free game separate from reality. “As technologies develop further, either in the form of Facebook’s metaverse or other forms of mixed or augmented reality that blur the line between online and offline, the potential disconnect between play and real-world violence is only going to grow more acute,” experts say.
-
-
Nearing the Tipping Point Needed to Reform Facebook, Other Social Media?
The recent series of five articles from the Wall Street Journal exposed Facebook’s complicity in spreading toxic content. Yet, social media platforms continue to enjoy free rein despite playing what many consider to be an outsized and destabilizing role in delivering content to billions of individuals worldwide. No one said reigning in social media was going to be easy. But the harm caused of social media is simply too big for us to fail.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.