-
The Spy Who Came in from the Wi-Fi: Beware of Radio Network Surveillance
New technology is able to infer the identity of persons with no WiFi device on them through signals in radio networks. Researchers warn of risks to privacy and call for protective measures.
-
-
Multitasking Raises Risk of Phishing
In the information age, multitasking is often worn as a badge of honor. But according to new research, multitasking may also blind us to hidden threats, thereby increasing our chances of falling victim to cybercrime.
-
-
Market Incentives and Cybersecurity: Fixing the Broken System Before It Breaks Us
Cybersecurity is not just an IT issue; it is a shared responsibility and an economic imperative. Only by ensuring resilience can we confidently adopt new technology and realize its benefits. The next horizon of the cyber security strategy would require a mix of incentives—including regulation, market forces and cultural change—to realize the objective of building a secure and resilient digital economy.
-
-
Power-Outage Exercises Strengthen the Resilience of U.S. Bases
In recent years, power outages caused by extreme weather or substation attacks have exposed the vulnerability of the electric grid. Now mandated by law, Lincoln Laboratory’s blackout drills are improving national security and ensuring mission readiness.
-
-
Computer Scientists Boost U.S. Cybersecurity
As cyber threats grow more sophisticated by the day, researchers are making computing safer thanks to federally funded research that targets some of the internet’s most pressing security challenges.
-
-
Robustly Detecting Sneaky Cyberattacks That Might Throw AI Spacecraft Off-Course
Cyberattacks on future, AI-guided spacecraft could be thwarted by unpicking what the AI has been “thinking.”
-
-
Cybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams
Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams. Study involving 19,500 UC San Diego Health employees evaluated the effectiveness of two different types of cybersecurity training.
-
-
Protecting the Grid with Artificial Intelligence
The electric grid powers everything from traffic lights to pharmacy fridges, but it regularly faces threats from severe storms and advanced attackers. New neural network detects physical issues, cyberattacks.
-
-
Large Language Models Can Execute Complete Ransomware Attacks Autonomously
Study demonstrates AI systems can carry out full attack campaigns, a warning to cybersecurity defenders.
-
-
Digital Siege Puts Taiwan’s Resilience to the Test
The most sustained conflict unfolding between China and Taiwan is not taking place on the water or in the air; it is happening in cyberspace.
-
-
How Poisoned Data Can Trick AI − and How to Stop It
The quality of the information that the AI offers depends on the quality of the data it learns from If someone tries to interfere with those systems by tampering with their training data –either the initial data used to build the system or data the system collects as it’s operating to improve –trouble could ensue.
-
-
First-of-its-Kind Industrial System Security Course
The University of Arkansas at Little Rock (UA Little Rock) is giving students the tools to protect the systems that power modern life through a new course focused on industrial system security.
-
-
Cybersecurity Suite That Helps Protect Nation Now Available to Public
A cybersecurity platform developed at Sandia National Laboratories to detect and analyze advanced malware threats is now publicly available, giving cyberdefenders across the public and private sectors access to tools previously used to help safeguard U.S. national security.
-
-
Microsoft Used China-Based Engineers to Support Product Recently Hacked by China
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but didn’t mention that it has long used China-based engineers to maintain the product.
-
-
A Little-Known Microsoft Program Could Expose the Defense Department to Chinese Hackers
Microsoft is using engineers in China to help maintain the Defense Department’s computer systems —with minimal supervision by U.S. personnel. Digital escorts often lack the technical expertise to police foreign engineers with far more advanced skills, leaving highly sensitive data vulnerable to hacking. Microsoft has been warned that the arrangement is inherently risky, but the company launched and expanded it anyway.
-
More headlines
The long view
Allfare: China’s Whole-of-Nation Strategy
To analyze how states exert their influence, scholars often compartmentalize actions into rigid analytical frameworks, which obscures the holistic scope of the challenge.
