• China Tried to Infiltrate Federal Reserve: Senate Report

    Fed Chair Jerome Powell and a senior member of Congress are at odds over a report issued Tuesday by Senate Republicans alleging that China is trying to infiltrate the Federal Reserve and that the central bank has done too little to stop it. China’s goal, according to the report, is to “supplant the U.S. as the global economic leader and end the U.S. dollar’s status as the world’s primary reserve currency.”

  • New Chief Information Officer (CIO) Program at NYU

    Created in partnership with Emeritus, the new nine-month executive program helps senior technology leaders and CIOs advance their C-suite leadership skills, transform information systems, and navigate rapidly changing remote and workforce trends.

  • NIST Updates Guidance for Health Care Cybersecurity

    In an effort to help health care organizations protect patients’ personal health information, NIST has updated its cybersecurity guidance for the health care industry. The revised draft publication aims to help organizations comply with HIPAA Security Rule.

  • Solution to Encrypted Messages Being Hacked Before Sending or After Receipt

    Message applications must do more to keep user data safe from undetected malware or over-the-shoulder eavesdropping that bypasses encryption before a message has been sent. Researchers have created a new end-to-end encryption mechanism that protects users’ communications at a far higher level than currently experienced on popular applications.

  • Google/Apple's Contact-Tracing Apps Susceptible to Digital Attacks

    Since the beginning of the COVID-19 pandemic, scientists and health authorities have relied on contact-tracing technologies to help manage the spread of the virus. Yet there’s a major flaw in a framework that many of these mobile apps utilize – one that attackers could exploit to ramp up false positive notifications.

  • U.S. Disrupts North Korea Ransomware Group, Recovers Nearly Half a Million

    U.S. law enforcement authorities have disrupted a group of North Korean hackers, recovering nearly half a million dollars in ransom payments it received from a Kansas hospital, a Colorado health care provider and other victims. The North Korea state-sponsored cybercriminals encrypted the Kansas hospital’s servers in May 2021, demanding ransom in exchange for regaining access to its critical computer networks.

  • New Computing Security Architecture Protects Sensitive Private Data

    Protecting sensitive information on the internet has become an essential feature for computing architectures. Applications that process such data must trust the system software they rely on, such as operating systems and hypervisors, but such system software is complex and often has vulnerabilities that can risk data confidentiality and integrity.

  • Safer Web Surfing with a New Method for Detecting Malicious Code Patterns

    With the ever-increasing importance of the Internet in our lives, there are growing attempts to exploit software vulnerabilities in our PCs for personal benefit. One way to do so is by infecting the victim’s PC with a malicious code injected through a website. A fast and reliable detection approach can analyze distribution patterns of malicious codes in websites.

  • Protecting Computer Vision from Adversarial Attacks

    Advances in computer vision and machine learning have made it possible for a wide range of technologies to perform sophisticated tasks with little or no human supervision — from autonomous drones and self-driving cars to medical imaging and product manufacturing. Engineers are developing methods to keep these autonomous machines and devices from being hacked.

  • The Chinese Military’s Access to AI Chips

    The Chinese military has made rapid progress in artificial intelligence. This progress largely depends on continued access to high-end semiconductors designed by American companies and produced in Taiwan and South Korea. The aggressive moves by the Trump and Biden administrations to limit technology exports to the Chinese military notwithstanding, China continues to order large quantities of American-designed advanced semiconductors from manufacturers in Taiwan and South Korea.

  • Cyberproofing Small and Medium Businesses -- a Small Step with a Big Impact

    Small businesses are not immune to cybersecurity incidents. In fact, they’re often more vulnerable because they lack the time, resources and sometimes the skills to prepare for and defend against an attack, or to mitigate and remedy any consequences. In Australia, they created a tool to help businesses quickly and easily test the security of their websites.

  • How Does the U.S. Power Grid Work?

    Responsible for powering the country and its economy, the U.S. energy grid has come under increasing strain due to climate change, and the threat of cyberattacks looms. The U.S. electric grid brings power to millions of homes and businesses via a vast network of transmission and distribution lines. Experts say the grid is increasingly vulnerable to extreme weather events, such as the February 2021 Texas winter storms, and cyberattacks. President Biden has proposed overhauling the grid, but his plans could face legal and political hurdles.

  • Insights into Blockchain Vulnerabilities

    Distributed ledger technology, such as blockchains, has become more prevalent across a variety of contexts over the past decade. The premise is that blockchains operate securely without any centralized control and that they are immutable or unsusceptible to change. New report details how centralization can be introduced, affecting security.

  • A Simple Tool Curbs Hacking, Makes Websites More Secure

    Researchers have developed a scanning tool to make websites less vulnerable to hacking and cyberattacks. The black box security assessment prototype is more effective than existing web scanners which collectively fail to detect the top 10 weaknesses in web applications.

  • “Hacking” Solutions for Pressing Cybersecurity Challenges

    When people think about the game capture the flag, memories of gym class or family trips likely come to mind. Researchers are participating in a slightly different version of this childhood favorite, where teams face off against opponents across the world to tackle real-world cybersecurity issues.