-
China's Internet Trolls Go Global
Chinese trolls are beginning to pose serious threats to economic security, political stability, and personal safety worldwide. The CCP-backed trolls have become more than a nuisance, and the magnitude and frequency of their attacks will likely continue to increase. Formulating an effective response will require understanding their size, tactics, and mission as the CCP widens the scope of its public opinion war to include foreign audiences.
-
-
Study Shows AI-Generated Fake Reports Fool Experts
AIs can generate fake reports that are convincing enough to trick cybersecurity experts. If widely used, these AIs could hinder efforts to defend against cyberattacks. These systems could set off an AI arms race between misinformation generators and detectors.
-
-
Researchers Discover Novel Class of Vehicle Cyberattacks
Vehicles are becoming more and more connected to the Internet, and malicious hackers are licking their lips. A team led by Carnegie Mellon University CyLab researchers have discovered a new class of cybersecurity vulnerabilities in modern day vehicles. If exploited, an attacker could sneak past a vehicle’s intrusion detection system (IDS) and shut down various components, including the engine, by executing some crafty computer code from a remote location. No hardware manipulations nor physical access to the vehicle are necessary.
-
-
Ghosts in the Machine: Malicious Bots Spread COVID Untruths
Malicious bots, or automated software that simulates human activity on social media platforms, are the primary drivers of COVID-19 misinformation, spreading myths and seeding public health distrust exponentially faster than human users could, suggests a new study.
-
-
Broad Swath of the Web Knocked Offline by Outage
A broad swath of the World Wide Web has been knocked offline by an outage at edge cloud CDN specialist Fastly. The company runs an “edge cloud,” which is designed to speed up loading times for websites, protect them from denial-of-service attacks, and help them deal with bursts of traffic. The technology requires Fastly to sit between most of its clients and their users. That means that if the service suffers a catastrophic failure, it can prevent those companies from operating on the net at all.
-
-
Fastly Global Internet Outage: Why Did So Many Sites Go Down — and What Is a CDN, Anyway?
If you were having difficulty accessing your favorite website on Tuesday time, you’re not alone. A jaw-dropping number of major websites around the globe suddenly became unavailable with no immediately obvious explanation — before reappearing an hour later. To understand why it happened, you need to know what a CDN (content delivery network) is and how crucial they are to the smooth running of the internet.
-
-
Like a Spellchecker for Developers: Automated Detection of Security Vulnerabilities in Cloud Applications
Cloud computing is a growing market. But cyberattacks on cloud software systems are on the rise, too, as these applications often contain security vulnerabilities that hackers are able to exploit. CodeShield software – which is produced by the company of the same name – uncovers these vulnerabilities and fixes them using automated methods.
-
-
Overconfidence in Identifying False News Makes One More Susceptible to It
A new study finds that individuals who falsely believe they are able to identify false news are more likely to fall victim to it. “Though Americans believe confusion caused by false news is extensive, relatively few indicate having seen or shared it,” said one researcher. “If people incorrectly see themselves as highly skilled at identifying false news, they may unwittingly be more likely to consume, believe and share it, especially if it conforms to their worldview.”
-
-
White House Urges US Companies to Protect Against Ransomware
The White House on Thursday urged American businesses to take new precautions to combat disruptive ransomware attacks that have increasingly hobbled companies throughout Western economies. Anne Neuberger, a White House cybersecurity official, said in a statement that the “most important takeaway” from the recent attacks, including those affecting a key gasoline pipeline and a meat production company in the U.S., is that “companies that view ransomware as a threat to their core business operations rather than a simple risk of data theft will react and recover more effectively.”
-
-
Shadow Figment Technology Foils Cyberattacks
Scientists have created a cybersecurity technology called Shadow Figment that is designed to lure hackers into an artificial world, then stop them from doing damage by feeding them illusory tidbits of success.
-
-
The Weaponized Web: The National Security Implications of Data
Open societies have encouraged and promoted rapid technological advancement and market innovation —but both have outpaced democratic governance. Authoritarian powers have noticed the underlying opportunity to exploit the open standards of the democratically regulated digital information environment and undermine democratic values and institutions while shoring up their own regimes. This poses a novel challenge for democracies, which must adapt to compete in this conflict over the data, architecture, and governance framework of the information space without compromising their democratic principles.
-
-
First Hacker-Resistant Cloud Software System
As the first system to guarantee the security of virtual machines in the cloud, SeKVM could transform how cloud services are designed, developed, deployed, and trusted.
-
-
Antisemitism on TikTok
Over the last few years, TikTok—the social media app that allows users to create and share short videos—has gained immense popularity. While much of the content on TikTok is lighthearted and fun, extremists have exploited the platform to share hateful content and recruit new adherents.
-
-
Cyber Attacks Can Shut Down Critical Infrastructure. It’s Time to Make Cyber Security Compulsory
The 7 May attack on the Colonial Pipeline highlights how vulnerable critical infrastructure such as fuel pipelines are in an era of growing cyber security threats. In Australia, we believe the time has come to make it compulsory for critical infrastructure companies to implement serious cyber security measures.
-
-
Evil Eye Gazes Beyond China’s Borders: Troubling Trends in Chinese Cyber Campaigns
On March 24, 2021, Facebook announced they had taken actions against an advanced persistent threat (APT) group located in China, previously monikered as Evil Eye. Evil Eye’s campaign was clearly motivated by a political goal that China frequently uses a blend of information operations (IO) and cyber means to accomplish: the disruption of dissidents, especially those who raise awareness of China’s human rights violations against its ethnic minorities.
-
More headlines
The long view
Encryption Breakthrough Lays Groundwork for Privacy-Preserving AI Models
In an era where data privacy concerns loom large, a new approach in artificial intelligence (AI) could reshape how sensitive information is processed. New AI framework enables secure neural network computation without sacrificing accuracy.
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.