-
Detecting Manipulations in Microchips
Attackers have the ability not only to manipulate software, but also to tamper with the hardware. A team from Bochum is devising methods to detect such tampering.
-
-
Is Your Cybersecurity Strategy Undermined by These Six Common Pitfalls?
Many security specialists harbor misconceptions about lay users of information technology, and these misconceptions can increase an organization’s risk of cybersecurity breaches. These issues include ineffective communications to lay users and inadequately incorporating user feedback on security system usability.
-
-
Expanding the AI Toolbox of Cybersecurity Defenders
Scientists have taken a key step toward harnessing a form of artificial intelligence known as deep reinforcement learning, or DRL, to protect computer networks. DRL shows the promise of an autonomous AI in proactive cyber defense.
-
-
Security Vulnerabilities Detected in Drones Made by DJI
Researchers have detected security vulnerabilities, some of them serious, in several drones made by the manufacturer DJI. These enable users, for example, to change a drone’s serial number or override the mechanisms that allow security authorities to track the drones and their pilots. In special attack scenarios, the drones can even be brought down remotely in flight.
-
-
Digital Twins Could Protect Manufacturers from Cyberattacks
Detailed virtual copies of physical objects, called digital twins, hold the promise of better products across automotive, health care, aerospace and other industries. According to a new study, cybersecurity may also fit neatly into the digital twin portfolio.
-
-
Can a Cyber shuffle Stop Hackers from Taking Over a Military Aircraft?
A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle hackers to take control of a military jet, commercial airliner or spacecraft. Sandia, Purdue team up to test cyberdefense against an algorithm trained to break it.
-
-
U.S. Dismantles Ransomware Network Responsible for More Than $100 Million in Extortion
An international ransomware network that extorted more than $100 million from hundreds of victims around the world has been brought down following a monthslong infiltration by the FBI. The group known as Hive targeted more than 1,500 victims, including hospitals, school districts and financial firms in more than 80 countries.
-
-
How Chinese Companies Are Challenging National Security Decisions That Could Delay 5G Network Rollout
In many countries, governments have decided to block Chinese companies from participating in building communication infrastructure in their countries because of national security concerns. Chinese companies and investors often refuse to take such national security changes lying down. With varying degrees of success, firms have mounted a range of formal and informal challenges in recent years.
-
-
Cybersecurity Defense Software Put Through the Wringer at NATO’s Cyber Coalition 2022
How might artificial intelligence help NATO allies protect information technology systems, power grids, and other assets?
-
-
New Method Tracks Groups of Anomalous Users
Malicious or fictitious users on internet networks have become the bane of the internet’s existence. Many bemoan the increasing presence of such users, but few have developed methods to track and expose them. Until now.
-
-
Revised Guidelines for Digital Identification in Federal Systems
NIST’s draft publication features updates intended to help fight online crime, preserve privacy and promote equity and usability.
-
-
Protecting DoD Microelectronics from Adversary Influence
The NSA publicly released four Cybersecurity Technical Reports to help the Department of Defense protect field-programmable gate array (FPGA)-based systems from adversary influence.
-
-
Testing Environments Help Secure Transportation Infrastructure
“All critical infrastructure sectors—including the energy, manufacturing, and transportation sectors—rely heavily on sophisticated technologies like industrial control systems, cellular networks, and artificial intelligence,” said DHS S&T’s Alex Karr. “These are all accessed, monitored, and controlled via the internet, which, in turn, makes them susceptible to hacking, malware attacks, and other malicious activities.”
-
-
New ‘Faraday Cage’ Research Facility to Help Combat Digital Crime
University of Huddersfield installing a new facility named the ‘Faraday Cage’ which will help speed-up the development and testing of new digital forensic processes to help law enforcement meet the huge growth rate in digital crime.
-
-
Major Global Security Challenges
What are the major threats the world is facing? Researchers highlight five such threats: The growing role of disinformation; attacks on the idea of democracy; environmental challenges; economic instability; and terrorism – both domestic and foreign.
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.