• Insights into Blockchain Vulnerabilities

    Distributed ledger technology, such as blockchains, has become more prevalent across a variety of contexts over the past decade. The premise is that blockchains operate securely without any centralized control and that they are immutable or unsusceptible to change. New report details how centralization can be introduced, affecting security.

  • A Simple Tool Curbs Hacking, Makes Websites More Secure

    Researchers have developed a scanning tool to make websites less vulnerable to hacking and cyberattacks. The black box security assessment prototype is more effective than existing web scanners which collectively fail to detect the top 10 weaknesses in web applications.

  • “Hacking” Solutions for Pressing Cybersecurity Challenges

    When people think about the game capture the flag, memories of gym class or family trips likely come to mind. Researchers are participating in a slightly different version of this childhood favorite, where teams face off against opponents across the world to tackle real-world cybersecurity issues. 

  • Cybersecurity Tools to Protect Solar, Wind Power on the Grid

    Solar panels and wind turbines are projected to produce 44% of America’s electricity by 2050, but they present cybersecurity challenges. They have sensors, controllers, actuators or inverters which are directly or indirectly connected to the internet using insecure connectivity to legacy electric grid systems. They have complex physics. They’re subject to advanced persistent threats. And there will be more and more of them going online.

  • Stronger Security for Smart Devices

    By Adam Zewe

    Researchers are pushing to outpace hackers and develop stronger protections that keep data safe from malicious agents who would steal information by eavesdropping on smart devices. The researchers have demonstrated two security methods that efficiently protect analog-to-digital converters from powerful attacks that aim to steal user data.

  • Five Cybersecurity Challenges Beyond Technology

    The data are clear: cyberattacks have been on the rise in recent years and the cybersecurity situation is increasingly complex. More than 90% of cyberattacks are made possible, to a greater or lesser extent, by human error.

  • Keeping Web-Browsing Data Safe from Hackers

    By Adam Zewe

    Studying a powerful type of cyberattack, researchers identified a flaw in how it’s been analyzed before, then developed new techniques that stop it in its tracks.

  • Who Cares about a Midterm Election? Comparing Russia, Iran, and China’s Electoral Interference from Past to Present

    By Clint Watts

    Midterm elections present a complicated target environment for foreign manipulators because, unlike presidential elections, there is no single candidate who can significantly alter U.S. foreign policy. But interference opportunities remain, and adversaries have the potential to advance their strategic objectives through a campaign meant to create further turbulence within U.S. democracy.

  • Operational Protection of Water Infrastructure Against Cyber-Physical Threats

    As the water supply system becomes more digitalized, cyberthreats are increasing. It is time for an all-hazard risk management and mitigation system.

  • A Quarter of World's Internet Users Rely on Infrastructure Highly Vulnerable to Attack

    About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South.

  • Inside the Government Fiasco That Nearly Closed the U.S. Air System

    By Peter Elkind

    The upgrade to 5G was supposed to bring a paradise of speedy wireless. But a chaotic process under the Trump administration, allowed to fester by the Biden administration, turned it into an epic disaster. The problems haven’t been solved.

  • Identifying and Predicting Insider Threats

    Insider threats are one of the top security concerns facing large organizations. Current and former employees, business partners, contractors—anyone with the right level of access to a company’s data—can pose a threat. A new project seeks to detect and predict insider threats.

  • Food Production Vulnerable to Cyberattacks

    Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.

  • S&T Hackathon: Thwarting Emerging Threats to Critical Infrastructure

    Threats against the U.S. critical infrastructure are not new—physical threats and natural disasters have challenged the U.S. critical infrastructure and their support systems time and time again. But the rapid development of new information and communication technologies, and their inevitable integration the into the U.S. critical infrastructure, bring with them the possibility of digital attacks and other new challenges that the United States must be ready to face.

  • Bad for Computer Security: Employees Returning to the Office

    When employees feel they deserve superior technology compared to other employees—and they don’t receive unrestricted access to it—they pose a security risk to their companies, according to a new research.