-
Five Cybersecurity Tips to Protect Yourself from Scams and Deepfakes
In an age where misinformation and deepfakes blur the lines between fact and fiction, identifying scams has never been more challenging. Cybersecurity experts share their top tips to help you protect yourself and your loved ones from scams and identity theft.
-
-
Keep the U.S. Government Focused on Combating Foreign Interference Operations
Countering foreign interference requires concerted policy efforts to raise the costs for adversaries. Harnessing military and intelligence capabilities to push back forcefully must be part of policy discussions to address foreign interference.
-
-
U.S. Slow to React to Pervasive Chinese Hacking: Experts
As new potential threats from Chinese hackers were identified this week, the federal government issued one of its strongest warnings to date about the need for Americans —and in particular government officials and other “highly targeted” individuals —to secure their communications against eavesdropping and interception.
-
-
China-Based Hacker Conspired to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwide
Chinese hacker and his co-conspirators worked at the offices of Sichuan Silence Information Technology Co. Ltd. to discover and exploit a previously-unknown vulnerability (an “0-day” vulnerability) in certain firewalls.
-
-
Police 'Need to Play a Larger Role' in Recovering Cybercrime Money
Police must become more involved in reimbursing money to victims of cybercrime, according to new research. The study also recommends that, as a priority, the police should make clear to communities that it can be relied upon in cases of economic cybercrime.
-
-
What is Salt Typhoon? A Security Expert Explains the Chinese Hackers and Their Aattack on U.S. Telecommunications Networks
Lost in the noise of the story is that Salt Typhoon has proved that the decades of warnings by the internet security community were correct. No mandated secret or proprietary access to technology products is likely to remain undiscovered or used only by “the good guys” – and efforts to require them are likely to backfire.
-
-
AI Fact Checks Can Increase Belief in False Headlines
Many tech companies and start-ups have touted the potential of automated fact-checking services powered by artificial intelligence to stem the rising tide of online misinformation, but a new study has found that AI-fact checking can, in some cases, actually increase belief in false headlines.
-
-
Chinese Hackers Still Lurk in U.S. Telecommunications systems
Chinese hackers blamed for compromising U.S. telecommunications infrastructure and spying on American presidential campaigns and American officials are still entrenched in those systems.
-
-
The Ghost Gun Surge Is Abating. This Is How It Happened.
Ghost guns went from being relatively rare to ubiquitous in a short time span. Regulating them appears to be fueling a reversal.
-
-
It’s Not Too Late to Regulate Persuasive Technologies
Prominent Chinese tech companies are developing and deploying powerful persuasive tools to work for the Chinese Communist Party’s propaganda, military and public security services—and many of them have already become global leaders in their fields. TikTok is only the tip of the iceberg.
-
-
How Does the Information Ecosystem Influence Politics?
A new course combines data and political science to understand some of the most vital phenomena of our time. “Persuasion is happening at scale on information platforms,” says an expert, “so we now have the chance to understand this question statistically.”
-
-
U.S. Army Cyber Command, DARPA Evaluate Advanced Cyber Threat Detection Technologies
Joint activities through the Constellation program accelerate maturation of tactical and strategic cyber capabilities.
-
-
Chinese Vessel Suspected of Severing Submarine Cables Still Anchored in Baltic Sea
European allies in the Baltic region are investigating how two fiber-optic data cables were severed earlier this week, with suspicion falling on a Chinese vessel in the area. Germany has said the incident was clearly sabotage.
-
-
Misinformation Really Does Spread Like a Virus, Suggest Mathematical Models Drawn from Epidemiology
When it comes to misinformation, “going viral” appears to be more than a simple catchphrase. Scientists have found a close analogy between the spread of misinformation and the spread of viruses: how misinformation gets around can be effectively described using mathematical models designed to simulate the spread of pathogens.
-
-
Suspected Chinese Hack of U.S. Telecoms Reveals Broader Plot
A hack of U.S. telecommunications systems linked to China that initially appeared to focus on the American presidential campaigns goes much deeper, according to investigators, and is likely part of a vast effort by Beijing to spy on the United States.
-
More headlines
The long view
Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters
Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.
Fake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
Building Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
Researchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI
Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.
