• CYBERSECURITYAre Mass Layoffs and Data Breaches Connected?

    Layoffs create conditions where disgruntled employees face added stress or job insecurity, so they are more likely to engage in risky behaviors that heighten the company’s vulnerability to data breaches.

  • CYBERSECURITYGet Ready for AI-supercharged Hacking

    By Niusha Shafiabady and Mamoun Alazab

    Artificial intelligence can supercharge the effect of hacking attacks. As use of AI widens, people and organizations will have to become much more careful in guarding against its malicious use. So far, the only answer to all this is increased vigilance, by individuals and their employers. Governments can help by publicizing the problem. They should.

  • CYBERSECURITYEvaluating Cybersecurity Risks Associated with EV Fast-Charging Equipment

    Engineers have identified cybersecurity vulnerabilities with electric vehicles (EVs) using direct current fast-charging systems, the quickest, commonly used way to charge electric vehicles. The high-voltage technology relies on power line communication (PLC) technology to transmit smart-grid data between vehicles and charging equipment.

  • ELECTION INTEGRITYRussian Election Meddlers Hurting Biden, Helping Trump, U.S. Intelligence Warns

    By Jeff Seldin

    Russia is turning to a familiar playbook in its attempt to sway the outcome of the upcoming U.S. presidential election, looking for ways to boost the candidacy of former President Donald Trump by disparaging the campaign of incumbent President Joe Biden, according to American intelligence officials.

  • SPACE SECURITYTo Guard Against Cyberattacks in Space, Researchers Ask ‘What If?’

    By Patrick Lin

    If space systems such as GPS were hacked and knocked offline, much of the world would instantly be returned to the communications and navigation technologies of the 1950s. Yet space cybersecurity is largely invisible to the public at a time of heightened geopolitical tensions.

  • RANSOMWARENew Report Advises How Ransomware Victims Can Be Better Supported

    By Olivia Miller

    A new report aims to shed light on the experience of victims of ransomware and identify several key factors that typically shape these experiences.

  • CHINA WATCHChina-Backed Hackers Step Up Spying on Taiwan: Security Firm

    Recorded Future said cyberespionage targeting Taiwan has intensified with a focus on its technology industry.

  • CHINA WATCHO-RAN Is Overhyped as Avoiding Chinese 5G Influence

    By Manoj Harjani

    In recent years, countries have faced a stark choice between Chinese and Western suppliers to develop their 5G cellular network infrastructure. While Chinese suppliers such as Huawei and ZTE are not trusted because of their ties and legal obligations to China’s party-state, Western suppliers have struggled to compete on cost. The emergence of Open Radio Access Network (O-RAN) technology has some promised, but the idea that O-RAN is a viable alternative to Chinese suppliers seems hollow.

  • CYBERSECURITYStudy Sheds Light on Shady World of Text Message Phishing Scams

    By Matt Shipman

    Researchers have collected and analyzed an unprecedented amount of data on SMS phishing attacks, shedding light on both the scope and nature of SMS phishing operations.

  • CYERSECURITYMajor Gaps in Cybersecurity at Auto Workshops

    Many auto workshops do not know enough about how to keep our cars safe from cyberattacks, a new study reveals. “A large proportion of the vehicle fleet could practically be entirely open to attacks or already breached,” says a cybersecurity expert.

  • CHINA WATCHChinese Nationalist Groups Are Launching Cyber-Attacks – Often Against the Wishes of the Government

    By Lewis Eves

    China is often presented as a monolithic entity, entirely at the whim of the Chinese Communist Party (CCP). However, the reality is more complex. Many Chinese cyber-attacks and other kinds of digital interference are conducted by Chinese nationalist groups.

  • CYBERSECURITYThe Future of Cybersecurity

    By Stanford Engineering Staff

    An expert in cybersecurity surveys a rapidly evolving world where technology is racing ahead of our ability to manage it, posing risks to our national security. With TikTok in the hands of 170 million Americans, cybersecurity expert Amy Zegart says it’s time to talk about consequences. Foreign access to all that data on so many Americans is a national security threat, she asserts.

  • CYBERSECURITYKnocking Cloud Security Off Its Game

    By Daniel Meierhans

    Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.

  • IRAN’S THREATU.S. Sanctions on Iranian Hackers Highlight Growing Concern About the Islamic Republic’s Cyberwarriors

    By Vasileios Karagiannopoulos and Iain Reid

    A feature of the simmering tensions between the US, Israel and Iran has been not just the tit-for-tat missile and drone strikes and assassinations, but accusations of cyberwarfare waged by Iran.

  • CYBERSECURITYComputer Scientists Unveil Novel Attacks on Cybersecurity

    By Katie Ismael

    Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Intel and AMD issued security alerts based on the findings.