• Government Action Needed to Ensure Insurance Against Major Hacking of Driverless Vehicles: Experts

    Government action is needed so driverless vehicles can be insured against malicious hacks which could have potentially catastrophic consequences, experts say. Traditional vehicle insurance wouldn’t cover the mass hacking of driverless cars, and an incident like this could cost the industry tens of billions of pounds.

  • Securing Data Transfers with Relativity

    The volume of data transferred is constantly increasing, but the absolute security of these exchanges cannot be guaranteed, as shown by cases of hacking frequently reported in the news. Scientists have implemented a new way to secure data transfers based on the physical principle of relativity.

  • U.S. Sanctions NSO Group, Israeli Maker of Pegasus Spyware

    The U.S. authorities said the NSO Group’s spyware helped authoritarian governments “silence dissent.” The new measures will limit NSO Group’s access to U.S. components and technology.

  • Protecting U.S. Critical Infrastructure from Cyberattacks

    Over the past year, there has been a sharp increase in cyberattacks using malware to target the systems of critical infrastructure such as utility companies, government agencies and organizations that provide services and products that we rely on daily.

  • Hackers-for-Hire Drive Evolution of Threat Landscape

    Cybersecurity threats are on the rise. The new edition of the ENISA Threat Landscape (ETL) highlights the surge in cybercriminality motivated by monetization using ransomware or cryptojacking. Supply-chains attacks also rank highly among prime threats because of the significant potential they have in inducing catastrophic cascading effects.

  • Targeted: Masterminds of Global Ransomware Attacks Against Critical Infrastructure

    Twelve individuals who were wreaking havoc across the world with ransomware attacks against critical infrastructure have been targeted as the result of a law enforcement and judicial operation involving eight countries.

  • Protecting Hardware from Software Attacks

    In order to break the endless cycle of software patch-and-pray, DARPA’s System Security Integration Through Hardware and firmware (SSITH) program aims to develop ASIC hardware with novel protections proven in mitigating against software attacks on hardware.

     

  • CISA, FBI, NSA Release BlackMatter Ransomware Advisory

    CISA, the FBI, and the NSA published a cybersecurity advisory regarding BlackMatter ransomware cyber intrusions targeting multiple U.S. critical infrastructure entities, including two U.S. food and agriculture sector organizations.

  • U.S. Leads Global Conference to Combat Ransomware Attacks

    The White House is holding a two-day international conference starting Wednesday to combat ransomware computer attacks on business operations across the globe that cost companies, schools and health services an estimated $74 billion in damages last year.

  • “Self-Aware' Algorithm Wards Off Hacking Attempts

    In 2010, the Stuxnet virus was used to damage nuclear centrifuges in Iran. Researchers have come up with a powerful response: to make the computer models that run these cyberphysical systems both self-aware and self-healing.

  • New Method to Extract and Separate Rare Earth Elements

    A new method improves the extraction and separation of rare earth elements from unconventional sources. The method could help develop a domestic supply of rare earth metals from industrial waste and electronics due to be recycled.

  • U.S. Unveils New Cybersecurity Requirements for Rail, Air

    DHS has unveiled new measures to make sure the U.S. air and surface transportation sectors will not be crippled by ransomware or cyberattacks. The new measures will apply to “higher risk” rail companies, “critical” airport operators, and air passenger and air cargo companies.

  • Hacking for Homeland Security

    On Monday (4 September), the Department of Homeland Security (DHS) announced the launch of the third Hacking for Homeland Security (H4HS). Participating students will focus on challenges associated with cybersecurity information sharing within transportation, the latency issue at screening checkpoints, and address greenspace issues after natural disasters.

  • “Smart” Security for Smart Devices

    Modern society is inundated with different types of smart devices designed to make people’s lives easier. each device has some amount of built-in security to help combat the threat of cyberattacks, the increased prevalence of these devices in recent years has created an industry-wide need for a new, “smart” approach to protect all smart devices from cyberattacks.

  • Apps for Popular Smart Home Devices Contain Security Flaws

    As Internet of Things (IoT) devices such as connected locks, motion sensors, security cameras and smart speakers become increasingly ubiquitous in households across the country, their surging popularity means more people are at risk of cyber intrusions. Researchers have found that the smartphone companion applications of 16 popular smart home devices contain “critical cryptographic flaws” that could allow attackers to intercept and modify their traffic.