-
Are Mass Layoffs and Data Breaches Connected?
Layoffs create conditions where disgruntled employees face added stress or job insecurity, so they are more likely to engage in risky behaviors that heighten the company’s vulnerability to data breaches.
-
-
Get Ready for AI-supercharged Hacking
Artificial intelligence can supercharge the effect of hacking attacks. As use of AI widens, people and organizations will have to become much more careful in guarding against its malicious use. So far, the only answer to all this is increased vigilance, by individuals and their employers. Governments can help by publicizing the problem. They should.
-
-
Evaluating Cybersecurity Risks Associated with EV Fast-Charging Equipment
Engineers have identified cybersecurity vulnerabilities with electric vehicles (EVs) using direct current fast-charging systems, the quickest, commonly used way to charge electric vehicles. The high-voltage technology relies on power line communication (PLC) technology to transmit smart-grid data between vehicles and charging equipment.
-
-
Russian Election Meddlers Hurting Biden, Helping Trump, U.S. Intelligence Warns
Russia is turning to a familiar playbook in its attempt to sway the outcome of the upcoming U.S. presidential election, looking for ways to boost the candidacy of former President Donald Trump by disparaging the campaign of incumbent President Joe Biden, according to American intelligence officials.
-
-
To Guard Against Cyberattacks in Space, Researchers Ask ‘What If?’
If space systems such as GPS were hacked and knocked offline, much of the world would instantly be returned to the communications and navigation technologies of the 1950s. Yet space cybersecurity is largely invisible to the public at a time of heightened geopolitical tensions.
-
-
New Report Advises How Ransomware Victims Can Be Better Supported
A new report aims to shed light on the experience of victims of ransomware and identify several key factors that typically shape these experiences.
-
-
China-Backed Hackers Step Up Spying on Taiwan: Security Firm
Recorded Future said cyberespionage targeting Taiwan has intensified with a focus on its technology industry.
-
-
O-RAN Is Overhyped as Avoiding Chinese 5G Influence
In recent years, countries have faced a stark choice between Chinese and Western suppliers to develop their 5G cellular network infrastructure. While Chinese suppliers such as Huawei and ZTE are not trusted because of their ties and legal obligations to China’s party-state, Western suppliers have struggled to compete on cost. The emergence of Open Radio Access Network (O-RAN) technology has some promised, but the idea that O-RAN is a viable alternative to Chinese suppliers seems hollow.
-
-
Study Sheds Light on Shady World of Text Message Phishing Scams
Researchers have collected and analyzed an unprecedented amount of data on SMS phishing attacks, shedding light on both the scope and nature of SMS phishing operations.
-
-
Major Gaps in Cybersecurity at Auto Workshops
Many auto workshops do not know enough about how to keep our cars safe from cyberattacks, a new study reveals. “A large proportion of the vehicle fleet could practically be entirely open to attacks or already breached,” says a cybersecurity expert.
-
-
Chinese Nationalist Groups Are Launching Cyber-Attacks – Often Against the Wishes of the Government
China is often presented as a monolithic entity, entirely at the whim of the Chinese Communist Party (CCP). However, the reality is more complex. Many Chinese cyber-attacks and other kinds of digital interference are conducted by Chinese nationalist groups.
-
-
The Future of Cybersecurity
An expert in cybersecurity surveys a rapidly evolving world where technology is racing ahead of our ability to manage it, posing risks to our national security. With TikTok in the hands of 170 million Americans, cybersecurity expert Amy Zegart says it’s time to talk about consequences. Foreign access to all that data on so many Americans is a national security threat, she asserts.
-
-
Knocking Cloud Security Off Its Game
Public cloud services employ special security technologies. Computer scientists at ETH Zurich have now discovered a gap in the latest security mechanisms used by AMD and Intel chips. This affects major cloud providers.
-
-
U.S. Sanctions on Iranian Hackers Highlight Growing Concern About the Islamic Republic’s Cyberwarriors
A feature of the simmering tensions between the US, Israel and Iran has been not just the tit-for-tat missile and drone strikes and assassinations, but accusations of cyberwarfare waged by Iran.
-
-
Computer Scientists Unveil Novel Attacks on Cybersecurity
Researchers have found two novel types of attacks that target the conditional branch predictor found in high-end Intel processors, which could be exploited to compromise billions of processors currently in use. Intel and AMD issued security alerts based on the findings.
-