-
Social Media Makes It Difficult to Identify Real News
There is a price to pay when you get your news and political information from the same place you find funny memes and cat pictures, new research suggests. The study found that people viewing a blend of news and entertainment on a social media site tended to pay less attention to the source of content they consumed – meaning they could easily mistake satire or fiction for real news.
-
-
Some Mobile Phone Apps Contain Hidden Secrets Compromising Users’ Private Data
Researchers have discovered that a large number of cell phone applications contain hardcoded secrets allowing others to access private data or block content provided by users. The study’s findings: that the apps on mobile phones might have hidden or harmful behaviors about which end users know little to nothing.
-
-
Uncertainty about Facts Can Be Reported Without Damaging Public Trust in News: Study
The numbers that drive headlines – those on Covid-19 infections, for example – contain significant levels of uncertainty: assumptions, limitations, extrapolations, and so on. Experts and journalists have long assumed that revealing the ‘noise’ inherent in data confuses audiences and undermines trust. A series of experiments – including one on the BBC News website – finds the use of numerical ranges in news reports helps us grasp the uncertainty of stats while maintaining trust in data and its sources.
-
-
Cryptocurrency Laundering Is a National Security Risk
As U.S. adversaries get more acquainted with blockchain technology, their hostile cyber operations are likely to rely increasingly on cryptocurrency activity. And rogue states are likely to become more innovative in using cryptocurrencies as they try to dampen the impact of U.S. economic sanctions.
-
-
Combating the Coronavirus Infodemic: Is Social Media Doing Enough?
The global coronavirus pandemic has also spawned an epidemic of online disinformation, ranging from false home remedies to state-sponsored influence campaigns. To stem the growing “infodemic,” social media platforms have moved quickly to quash disinformation on their platforms. Their response represents the strongest attempts to police disinformation to date, though actual results have been mixed.
-
-
Journalism Is an “Attack Surface” for Those Spreading Misinformation
For all the benefits in the expansion of the media landscape, we’re still struggling with the spread of misinformation—and the damage is especially worrisome when it comes to information about science and health. “Believing things that aren’t true when it comes to health can be not just bad for us, but dangerous,” said one expert.
-
-
Faster Way to Replace Bad Data with Accurate Information
Research have demonstrated a new model of how competing pieces of information spread in online social networks and the Internet of Things (IoT). The findings could be used to disseminate accurate information more quickly, displacing false information about anything from computer security to public health.
-
-
Preventing Quantum Cyberattacks
From defense and health information to social networking and banking transactions, communications increasingly rely on cryptographic security amid growing fears of cyberattacks. However, can such sensitive data be unhackable?
-
-
Why Does Russia Use Disinformation?
There is much discussion about Russian disinformation in today’s popular discourse, but the conversation about why Russia uses disinformation usually does not get beyond general notions of Moscow wanting to “divide us” or “muddy the waters.” Kasey Stricklin writes that this is dangerous and incorrect thinking, because, in fact, “Russia has a number of strategic goals that it hopes to advance through its use of disinformation, including restoring Russia to great power status, preserving its sphere of influence, protecting the Putin regime and enhancing its military effectiveness.
-
-
Deal with Ransomware the Way Police Deal with Hostage Situations
When faced with a ransomware attack, a person or company or government agency finds its digital data encrypted by an unknown person, and then gets a demand for a ransom. The two major ways people have so far responded – pay the ransom of hire a specialist to recover the data — are missing another option that we have identified in our cybersecurity policy studies. Police have a long history of successful crisis and hostage negotiation – experience that offers lessons that could be useful for people and organizations facing ransomware attacks.
-
-
Cyber Attacks against Hospitals and the COVID-19 Pandemic: How Strong are International Law Protections?
In a situation where most, if not all of us are potential patients, few government-provided services are more important than the efficient delivery of health care. The strain on hospitals around the world is rapidly growing, to which states have responded by mobilizing military medical units, nationalizing private medical facilities, and building emergency hospitals. All of this underlines the urgent need to understand what protections the law offers against attacks – including cyberattacks – on medical facilities.
-
-
In Politics and Pandemics, Russian Trolls Use Fear, Anger to Drive Clicks
Facebook users flipping through their feeds in the fall of 2016 faced a minefield of Russian-produced targeted advertisements pitting blacks against police, southern whites against immigrants, and gun owners against Obama supporters. The cheaply made ads were full of threatening, vulgar language, but according to a sweeping new analysis, they were remarkably effective, eliciting clickthrough rates as much as nine times higher than what is typical in digital advertising. The Kremlin-sponsored troll farms are still at it, already engaged in disinformation campaigns around COVID-19.
-
-
Strengthening Cybersecurity in Sports Stadiums
Someone pulled a fire alarm during the February 2018 school shooting in Parkland, Florida, which killed 17 students and teachers. The alarm caused more students to move into the hallways and into harm’s way. “Hackers no longer use cyberattacks to cause cyber damage,” says an expert. Instead, “they are using these attacks to cause physical damage or put people in locations to maximize physical damage.” Sports venues, with tens of thousands of spectators, are especially vulnerable. To combat the cyber threat in sports, scientists built an assessment tool for team and stadium owners to fix vulnerabilities.
-
-
Protecting U.S. Energy Grid and Nuclear Weapons Systems
To deter attempts to disable U.S. electrical utilities and to defend U.S. nuclear weapon systems from evolving technological threats, Sandia researchers have begun two multiyear initiatives to strengthen U.S. responses.
-
-
How Secure Are 4- and 6-Digit Mobile Phone PINs
Apple and Android implement a number of measures to protect their users’ devices. An international team of IT security experts has investigated how useful they are. They found that six-digit PINs actually provide little more security than four-digit ones. They also showed that the blacklist used by Apple to prevent particularly frequent PINs could be optimized and that it would make even greater sense to implement one on Android devices.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.