-
U.S. Slow to React to Pervasive Chinese Hacking: Experts
As new potential threats from Chinese hackers were identified this week, the federal government issued one of its strongest warnings to date about the need for Americans —and in particular government officials and other “highly targeted” individuals —to secure their communications against eavesdropping and interception.
-
-
China-Based Hacker Conspired to Develop and Deploy Malware That Exploited Tens of Thousands of Firewalls Worldwide
Chinese hacker and his co-conspirators worked at the offices of Sichuan Silence Information Technology Co. Ltd. to discover and exploit a previously-unknown vulnerability (an “0-day” vulnerability) in certain firewalls.
-
-
Police 'Need to Play a Larger Role' in Recovering Cybercrime Money
Police must become more involved in reimbursing money to victims of cybercrime, according to new research. The study also recommends that, as a priority, the police should make clear to communities that it can be relied upon in cases of economic cybercrime.
-
-
What is Salt Typhoon? A Security Expert Explains the Chinese Hackers and Their Aattack on U.S. Telecommunications Networks
Lost in the noise of the story is that Salt Typhoon has proved that the decades of warnings by the internet security community were correct. No mandated secret or proprietary access to technology products is likely to remain undiscovered or used only by “the good guys” – and efforts to require them are likely to backfire.
-
-
Chinese Hackers Still Lurk in U.S. Telecommunications systems
Chinese hackers blamed for compromising U.S. telecommunications infrastructure and spying on American presidential campaigns and American officials are still entrenched in those systems.
-
-
U.S. Army Cyber Command, DARPA Evaluate Advanced Cyber Threat Detection Technologies
Joint activities through the Constellation program accelerate maturation of tactical and strategic cyber capabilities.
-
-
Suspected Chinese Hack of U.S. Telecoms Reveals Broader Plot
A hack of U.S. telecommunications systems linked to China that initially appeared to focus on the American presidential campaigns goes much deeper, according to investigators, and is likely part of a vast effort by Beijing to spy on the United States.
-
-
AI-driven Cyberattacks More Sophisticated and Scalable, but There Are Solutions
Cyberattacks used to be engineered by crafty hackers looking to infiltrate computer systems. Artificial intelligence now allows hackers to create a new scale of attacks that penetrate banking, critical infrastructure, intellectual property, and even traffic lights and baby monitors.
-
-
CyberForce Competition Challenges College Students to Use Cybersecurity Skills to Defend Their Wind Energy System
College teams will work to outsmart a simulated attack on a U.S. wind energy plant. The CyberForce Competition offers students hands-on experience, igniting their passion for cybersecurity.
-
-
Salt Typhoon Hack Shows There's No Security Backdoor That's Only for The "Good Guys"
If U.S. policymakers care about China and other foreign countries engaging in espionage on U.S. citizens, it’s time to speak up in favor of encryption by default. If these policymakers don’t want to see bad actors take advantage of their constituents, domestic companies, or security agencies, again—they should speak up for encryption by default.
-
-
Oversight Revealed in AI Image Recognition Tools
Artificial intelligence can help people process and comprehend large amounts of data with precision, but the image recognition platforms and computer vision models that are built into AI frequently overlook an important back-end feature called the alpha channel. Researchers developed a proprietary attack called AlphaDog to study how hackers can exploit this oversight.
-
-
2025 Homeland Threat Assessment
DHS has issued its 2025 threat assessment, focusing on the most direct, pressing threats to the U.S. homeland during the next year. The assessment is organized around DHS missions that most closely align or apply to these threats—public safety, border and immigration, critical infrastructure, and economic security.
-
-
Election Security: When to Worry, When to Not
Everyone wants an election that is secure and reliable and that will ensure that the voters’ actual choices are reflected in the results. At the same time, not every problem in voting technology or systems is worth pulling the fire alarm —we have to look at the bigger story and context. And we have to stand down when our worst fears turn out to be unfounded.
-
-
U.S. Warns Voters of Disinformation Deluge
American voters are likely about to be swamped by a flood of misinformation and influence campaigns engineered by U.S. adversaries aiming, according to senior U.S. intelligence officials, to sway the results of the upcoming presidential election and cast doubt on the process itself.
-
-
You’d Never Fall for an Online Scam, Right?
Wrong, says cybersecurity expert. Con artists use time-tested tricks that can work on anyone regardless of age, IQ — what’s changed is scale.
-
More headlines
The long view
Researchers Calculate Cyberattack Risk for All 50 States
Local governments are common victims of cyberattack, with economic damage often extending to the state and federal levels. Scholars aggregate threats to thousands of county governments to draw conclusions.