-
A Quarter of World's Internet Users Rely on Infrastructure Highly Vulnerable to Attack
About a quarter of the world’s Internet users live in countries that are more susceptible than previously thought to targeted attacks on their Internet infrastructure. Many of the at-risk countries are located in the Global South.
-
-
Inside the Government Fiasco That Nearly Closed the U.S. Air System
The upgrade to 5G was supposed to bring a paradise of speedy wireless. But a chaotic process under the Trump administration, allowed to fester by the Biden administration, turned it into an epic disaster. The problems haven’t been solved.
-
-
Identifying and Predicting Insider Threats
Insider threats are one of the top security concerns facing large organizations. Current and former employees, business partners, contractors—anyone with the right level of access to a company’s data—can pose a threat. A new project seeks to detect and predict insider threats.
-
-
Food Production Vulnerable to Cyberattacks
Wide-ranging use of smart technologies is raising global agricultural production but cyber experts warn this digital-age phenomenon could reap a crop of another kind – cybersecurity attacks.
-
-
S&T Hackathon: Thwarting Emerging Threats to Critical Infrastructure
Threats against the U.S. critical infrastructure are not new—physical threats and natural disasters have challenged the U.S. critical infrastructure and their support systems time and time again. But the rapid development of new information and communication technologies, and their inevitable integration the into the U.S. critical infrastructure, bring with them the possibility of digital attacks and other new challenges that the United States must be ready to face.
-
-
Bad for Computer Security: Employees Returning to the Office
When employees feel they deserve superior technology compared to other employees—and they don’t receive unrestricted access to it—they pose a security risk to their companies, according to a new research.
-
-
Faster Ransomware Detection
Ransomware extortion is hugely expensive, and instances of ransomware extortion are on the rise. The FBI reports receiving 3,729 ransomware complaints in 2021, with costs of more than $49 million. What’s more, 649 of those complaints were from organizations classified as critical infrastructure.
-
-
New Method Kills Cyberattacks in Less Than a Second
Researchers, using artificial intelligence, new method that could automatically detect and kill cyberattacks on our laptops, computers and smart devices in under a second.
-
-
How Destructive Is a DDoS Cyberattack?
Last weekend, Russian hackers attacked several German government websites. These cyberattacks were seemingly harmless, much to the relief of the authorities. But many others are not so lucky.
-
-
Undetected and Dormant: Managing Australia’s Software Security Threat
At the same time as software has become integral to our prosperity and national security, attacks on software supply chains are on the rise. Software supply chain attacks are popular, can have a big impact and are used to great effect by a range of cyber adversaries.
-
-
Cybersecurity Guidance for Supply Chain Risk Management
A new update to the NIST’s cybersecurity supply chain risk management (C-SCRM) guidance aims to help organizations protect themselves as they acquire and use technology products and services.
-
-
Russia’s Hybrid War in Ukraine
Microsoft last week released a report which details a broad cyberattacks campaign by Russia in Ukraine, a campaign conducted in concert with kinetic military action. At least six Russian Advanced Persistent Threat (APT) actors and other unattributed threats, have conducted destructive attacks, espionage operations, or both, while Russian military forces attack the country by land, air, and sea.
-
-
A Cyber Security Intrusion Detection System for Industrial Control Systems
Researchers have developed technology to help government and industry detect cyber threats to industrial networks used in critical infrastructure and manufacturing systems.
-
-
New Tool in the Fight Against Hackers
A new form of security identification could soon see the light of day and help us protect our data from hackers and cybercriminals. Quantum mathematicians have solved a mathematical riddle that allows for a person’s geographical location to be used as a personal ID that is secure against even the most advanced cyberattacks.
-
-
AI, Machine Learning to Help Defend Against Cyberattacks
Two new tools are helping cybersecurity professionals fight the vast volume of threats and attacks— artificial intelligence (AI) and machine learning. AI and machine learning can detect novel malicious code, catch fraudulent charges on a credit card or fraudulent network login attempts, block phishing messages on an email service and assist companies with cloud management in spotting anomalies that traditional cyber defense technologies may not pick up.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.