• Detecting Malicious Broadcast Receivers

    The Android operating system has a large share of the mobile market and as such is a target for malware creators and other third parties who would manipulate the system for personal gain. So how might we enhance the detection of malware on the Android operating system commonly used to run mobile phones and tablets?

  • Using Math to Prove Computer Security

    An academic mathematician thought maths was boring, but he now relies on it to secure critical systems like those of the Australian Department of Defense against hackers.

  • Boosting Resilience of U.S. Timekeeping

    The U.S. should bolster research and development of systems that distribute accurate time via fiber-optic cable and radio as part of the effort to back up GPS and enhance the resilience of critical infrastructure that depends on it.

  • Stacked Deep Learning: Deeper Defense against Cyberattacks

    Internet-based industrial control systems are widely used to monitor and operate factories and critical infrastructure. Moving these systems online has made them cheaper and easier to access, but it has also made them more vulnerable to attack. Stacked deep learning offers a better way to detect hacking into industrial control systems. 

  • University of Central Florida Students Defend Virtual Energy System to Win CyberForce Competition

    The Knights of the University of Central Florida won the DOE’s CyberForce Competition, valiantly defending and securing a hydropower energy system against a malicious virtual cyberattack. The event challenged 120 teams from 105 colleges and universities to thwart a simulated cyberattack.

  • Preparing Future Cybersecurity Leaders for Protecting Critical Infrastructure

    A network of Virginia universities, in partnership with the Virginia Department of Elections, joined to create an innovative educational program to train future cybersecurity professionals to protect election infrastructure.

  • Belarusian Government Linked to Hacking, Disinformation Campaign

    U.S. cybersecurity researchers say they have uncovered evidence that the Belarusian government is linked to a hacking and disinformation campaign against Eastern European NATO members.

  • Managing the Cybersecurity Vulnerabilities of Artificial Intelligence

    The National Security Commission on Artificial Intelligence found that, “While we are on the front edge of this phenomenon, commercial firms and researchers have documented attacks that involve evasion, data poisoning, model replication, and exploiting traditional software flaws to deceive, manipulate, compromise, and render AI systems ineffective.” Jim Dempsey writes that “In assembling a toolkit to deal with AI vulnerabilities, insights and approaches may be derived from the field of cybersecurity. Indeed, vulnerabilities in AI-enabled information systems are, in key ways, a subset of cyber vulnerabilities.”

  • Serious Security Vulnerabilities in DRAM Memory Devices

    Researchers have discovered major vulnerabilities in DRAM memory devices, which are widely used in computers, tablets and smartphones. The vulnerabilities have now been published together with the National Cyber Security Centre, which for the first time has assigned an identification number for it.

  • A Secure Environment for Developing the Future of Cybersecurity Solutions

    To stay ahead of hackers and cybercriminals, we need a rapid, streamlined way to develop, test, and utilize cutting-edge cybersecurity solutions. DHS ST and CISA are partnering to develop CISA’s Cybersecurity Laboratory.

  • CyberForce Competition: Collegiate Students Try to Outwit Cyberattackers

    The cybersecurity field faces a shortfall of qualified professionals to fill nearly half a million open jobs. The CyberForce Competition, to be held on 13 November at the Argonne National Laboratory, will see college and university students from across the United States attempt to thwart a simulated cyberattacks. The competition seeks to inspire and help develop the next generation of energy sector cyber defenders.

  • Interpol Unveils Emerging Cyberthreats

    The exceptional COVID-19 crisis has fueled the increase of cybercrime in all its forms, while grey infrastructure serves to facilitate the proliferation of crime.

  • Important Breakthrough to Help Secure Electrical Grid

    As the electrical grid is modernized, it requires new safeguards to keep it safe from cyberattackers. Researchers have developed a novel security approach to find and stop cyberthreats that penetrate the IT layer, preserving grid stability.

  • Protecting Infrastructure from Hackers

    Two Midwestern universities lead an effort to form a coalition of regional research centers to work together to develop the region’s cyber defense talent with an eye to bolstering the defense of the region’s infrastructure against hackers.

  • U.S. Offers Reward for Information on Russian DarkSide Cybercrime Group

    The United States has announced a reward of up to $10 million for information leading to the identification or location of any individual holding a “key leadership” position in DarkSide, a cybercrime group believed to be tied to Russia.The DarkSide syndicate was behind the attack on Colonial Pipeline – the largest publicly disclosed cyberattack against critical infrastructure in the United States.