-
Man Charged for Participation in LockBit Global Ransomware Campaign
A criminal complaint filed in the District of New Jersey was earlier this week, charging a dual Russian and Canadian national for his alleged participation in the LockBit global ransomware campaign.
-
-
No Evidence of Any Voting Machine Compromised: CISA
“We have seen no evidence that any voting system deleted or lost votes, changed votes, or was any way compromised in any race in the country”: CISA
-
-
Improving Security for Smart Systems
In an increasingly connected and smart world, sensors collect and share large amounts of data to help people make decisions. Researchers has recently developed a way to statistically analyze such complex sensor data, so that the computer algorithms that make data-based decisions can be more resilient and better able to cope with small errors.
-
-
U.S. Officials Hope Confidence Campaign Pays Off for Midterm Elections
“Americans should go to the ballot box with confidence,” Jen Easterly, the director of the Cybersecurity and Election Security Agency (CISA), told a cybersecurity forum late last month. Yet U.S. officials also acknowledge the threats to Tuesday’s elections are serious and are being treated with proper caution.
-
-
DHS Unveils New Cybersecurity Performance Goals for Critical Infrastructure
DHS released the Cybersecurity Performance Goals (CPGs), voluntary practices that outline the highest-priority baseline measures businesses and critical infrastructure owners of all sizes can take to protect themselves against cyber threats.
-
-
Extracting Personal Information from Anonymous Cell Phone Data
Researchers haves extracted personal information, specifically protected characteristics like age and gender, from anonymous cell phone data using machine learning and artificial intelligence algorithms, raising questions about data security.
-
-
Improving Recovery of Critical Systems after Cyberattacks
Researchers aim to develop fast, accurate and efficient recovery mechanisms that, when coupled with the expeditious damage assessment techniques he has already developed, will offer an “integrated suite solution.” This will allow affected CI systems to continue running while providing as many critical functionalities as possible.
-
-
Ukraine Warns of Looming Russian Cyberattacks
Ukraine is again urging its companies and private organizations to immediately bolster their cybersecurity ahead of what could be a new wave of Russian attacks. The government advisory further warned that the vulnerabilities could allow Russia to launch a renewed series of targeted cyberattacks on Ukraine aimed at disabling communication and information systems.
-
-
How Can Countries Protect Critical Infrastructure from Cyberattacks?
Hacking attacks on power grids, telecom networks, or governments can paralyze entire societies. That makes them a powerful military weapon, as the war in Ukraine demonstrates. How can countries protect themselves?
-
-
Thinking Like a Cyberattacker to Protect User Data
A component of computer processors that connects different parts of the chip can be exploited by malicious agents who seek to steal secret information from programs running on the computer. Researchers develop defense mechanisms against attacks targeting interconnection of chips in computers.
-
-
More Governments Use Spyware to Monitor Their People, Compromising Privacy
The right to privacy is under siege as an increasing number of governments are using spyware to keep tabs on their people. Many governments are using modern digital networked technologies to monitor, control and oppress their populations.
-
-
EFF’s “Cover Your Tracks” Will Detect Your Use of iOS 16’s Lockdown Mode
Apple’s new iOS 16 offers a powerful tool for its most vulnerable users. Lockdown Mode reduces the avenues attackers have to hack into users’ phones by disabling certain often-exploited features. But there is a catch.
-
-
Three Iranian Nationals Charged with Cyber Plots Against U.S. Critical Infrastructure Providers
An indictment was unsealed Wednesday charging three Iranian nationals with allegedly orchestrating a scheme to hack into the computer networks of multiple U.S. victims, including critical infrastructure providers. The defendants’ hacking campaign exploited known vulnerabilities in commonly used network devices and software applications to gain access and exfiltrate data and information from victims’ computer systems.
-
-
Off-the-Shelf Crypto-Detectors Give a False Sense of Data Security
A team of computer scientists outlines a leading reason behind insecure data and makes recommendations about how to fix the problem.
-
-
Risks of North Korean Chemical, Biological Weapons; EMP; and Cyber Threats
What WMD and cyber capabilities does North Korea currently have? How does North Korea use or threaten to use these capabilities? What are North Korea’s goals in employing its WMD and cyber capabilities? What impact could this use have? How can the ROK-U.S. rein in and defeat the North’s WMD and cyber capabilities?
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.