-
Safeguarding the Nation’s Supercomputers
Researchers have developed a system to ferret out questionable use of high-performance computing (HPC) systems within the U.S. Department of Energy (DOE). As HPC systems become more powerful—arguably the most sophisticated and largest systems in the world—they are under potential threat by attackers seeking to run malicious software.
-
-
U.S. Bracing for Attacks Before and After Election Day
U.S. intelligence officials have already confirmed attacks on the election have been underway for some time, with Russia, China and Iran all waging operations designed to influence the way voters cast their ballots. And more recently, intelligence officials warned that Russia and Iran managed to acquire voter registration data while hacking into U.S. databases. In another significant difference from the 2016 and 2018 elections, intelligence and election security officials warn that, this time, the assault on the election will not end when the polls close. Instead, they say the attacks will persist, likely until at least the presidential inauguration on January 20, 2021.
-
-
Ransomware Can Interfere with Elections and Fuel Disinformation – Basic Cybersecurity Precautions Are Key to Minimizing the Damage
Government computer systems in Hall County, Georgia, including a voter signature database, were hit by a ransomware attack earlier this fall in the first known ransomware attack on election infrastructure during the 2020 presidential election. Thankfully, county officials reported that the voting process for its citizens was not disrupted. Attacks like these underscore the challenges that cybersecurity experts face daily – and which loom over the upcoming election. As a cybersecurity professional and researcher, I can attest that there is no silver bullet for defeating cyber threats like ransomware. Rather, defending against them comes down to the actions of thousands of IT staff and millions of computer users in organizations large and small across the country by embracing and applying the basic good computing practices and IT procedures that have been promoted for years.
-
-
Will Russia influence the American vote?
U.S. voters should prepare for strange and unexpected forms of information warfare that manipulate, distort or destroy election-related information between now and Election Day – and perhaps beyond that, depending on whether there are questions about who may have won the presidency. Since 2016, Americans have learned that foreign interests attempt to affect the outcomes of presidential elections, including with social media postings and television ads. As a scholar of Russian cyber operations, I know other nations, and Russia in particular, will go to extreme measures to influence people and destabilize democracy in the U.S. and elsewhere.
-
-
Detecting “Deepfake” Videos by Checking for the Pulse
With video editing software becoming increasingly sophisticated, it’s sometimes difficult to believe our own eyes. Did that actor really appear in that movie? Did that politician really say that offensive thing? Some so-called “deepfakes” are harmless fun, but others are made with a more sinister purpose. But how do we know when a video has been manipulated?
-
-
Improving Security, Usability of Zoom's End-to-End Encryption Protocol
During the global coronavirus pandemic, many people have been working, teaching and learning from home and utilizing Zoom as a way to have face-to-face communication. Although this is a main resource for virtual human interaction, there are still concerns for back-end security issues and meeting hackings.
-
-
U.S. Puts Sanctions on Russian Research Institution Tied to Malware That Targets Industrial Systems
The United States has placed sanctions on a Russian government research institute connected to the development of computer malware capable of targeting industrial safety systems and causing catastrophic damage.
-
-
Huge, Sophisticated Black Market for Trade in Online “Fingerprints”
Security on the internet is a never-ending cat-and-mouse game. Security specialists constantly come up with new ways of protecting our treasured data, only for cyber criminals to devise new and crafty ways of undermining these defenses. A thriving black market for user profiles is used by criminals to circumvent authentication methods that secure our online secrets.
-
-
Predicting the Likelihood of Cyberattacks Between Nations
Where in the world might the next cyberattack between nations take place? A new online database developed by a team computer scientists and international studies students predicts that there is an “extremely high likelihood” of a Russian cyberattack on Ukraine. The second most likely? The United States against Iran.
-
-
U.S. Says Russian Hackers Targeted State, Local Governments Ahead of Election
Russian state-sponsored hackers have targeted dozens of U.S. state and local government networks in recent weeks and stolen data from at least two servers, the U.S. government says. In an advisory released on October 22, the Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) described a range of activity from Russian-backed hackers since at least September.
-
-
Finally: A Usable, Secure Password Policy Backed by Science
After nearly a decade of studies, the passwords research group in Carnegie Mellon’s CyLab Security and Privacy Institute has developed a policy for creating passwords that maintains balance between security and usability—one backed by hard science.
-
-
Intelligence Agencies Accuse Iran, Russia of Trying to Use Voter Registration Data to Sow Chaos Ahead of US Election
U.S. intelligence agencies are accusing Iran and Russia of trying to use voter registration data in “desperate attempts” to sow chaos and confusion ahead of the November 3 U.S. presidential election. In a hastily called news conference late Wednesday, Director of National Intelligence John Ratcliffe said that “We have confirmed that some voter registration information has been obtained by Iran, and separately, by Russia,” he said, adding both countries “have taken specific actions to influence public opinion relating to our elections.”
-
-
Adversaries May Launch Efforts to Undermine Americans’ “Confidence in the Integrity of the Electoral Process”: CISA
“We remain confident that no foreign cyber actor can change your vote, and we still believe that it would be incredibly difficult for them to change the outcome of an election at the national level. But that doesn’t mean various actors won’t try to introduce chaos in our elections and make sensational claims that overstate their capabilities. In fact, the days and weeks just before and after Election Day is the perfect time for our adversaries to launch efforts intended to undermine your confidence in the integrity of the electoral process”: Christopher Krebs, director of CISA.
-
-
Kathleen Hall Jamieson on the 2020 Election
Professor Kathleen Hall Jamieson discusses what we learned from the election four years ago plus how journalists can responsibly share hacked content and what role the public at large can play. She says that in some ways, the country is better prepared today than during the 2016 election cycle, which was fraught with cybertrolls, hacked emails, and leaked content. In other ways, the United States hasn’t learned much from that experience.
-
-
Details of Russia’s Cyberattacks against Olympic, Paralympic Games Revealed
The U.K. On Monday (19 October) exposed malicious cyberactivity from Russia’s GRU military intelligence service against organizations involved in the 2020 Olympic and Paralympic Games before they were postponed. The U.K. National Cyber Security Center (NCSC) said that the incident was intended to sabotage the running of the Winter Olympic and Paralympic Games, as the malware was designed to wipe data from and disable computers and networks.
-