-
A new cybersecurity research group focuses on human behavior
Sociologist David Maimon’s earliest research examined the effects neighborhoods have in determining why some people in neighborhoods engage in crime and deviant behaviors. In 2010, he turned his focus to cybercrime and the unique online ecosystem in which cybercriminals thrive. Maimon leads the Evidence-based Cybersecurity Research Group at GSU. “The notion of ‘cybersecurity’ in academic literature and the world is still technical,” he said. “Our work is unique in that we focus on human behavior.”
-
-
U.S. prepared to strike in cyberspace
The United States is prepared to go on the offensive in cyberspace to ensure adversaries know there is a price to pay for hacks, network intrusions and other types of attacks. President Donald Trump signed a new National Cyber Strategy on Thursday, calling for a more aggressive response to the growing online threat posed by other countries, terrorist groups and criminal organizations.
-
-
More evidence dossier did not start Russia investigation
ABC News’ latest reporting corroborates the now well-known fact: The Christopher Steele’s dossier was not the impetus for the FBI’s Russia investigation.
-
-
Government hacking raises new security concerns
News of governments such as Russia and North Korea deploying their tech teams to hack into companies for political reasons has made headlines (think Sony after release of the movie The Interview). But what about when the U.S. government “hacks” to get around security measures designed to protect consumers? Can those hacks backfire and put us all at risk?
-
-
Beyond deep fakes: Automatically transforming video content into another video's style
Researchers have created a method that automatically transforms the content of one video into the style of another. For instance, Barack Obama’s style can be transformed into Donald Trump. Because the data-driven method does not require human intervention, it can rapidly transform large amounts of video, making it a boon to movie production, as well as to the conversion of black-and-white films to color and to the creation of content for virtual reality experiences.
-
-
S&T awards $11.6 million to defend against network, internet disruptions
Five research organizations were awarded separate contracts totaling $11,511,565 to develop new methods to identify and attribute Network/Internet-scale Disruptive Events (NIDEs), the DHS S&T announced last week.
-
-
Cyber insurance market to double by 2020: Munich Re
Cyber risks are one of the biggest threats to the digital and networked economy. The most important thing for companies is to ensure they have the best possible technical prevention. Munich Re says it is developing insurance products and services that offer policyholders the greatest possible protection.
-
-
Securing Americans’ votes
To protect the integrity and security of U.S. elections, all local, state, and federal elections should be conducted using human-readable paper ballots by the 2020 presidential election, says a new report from the National Academies of Sciences. In addition, every effort should be made to use paper ballots in the 2018 federal election. Ballots that have been marked by voters should not be returned over the Internet or any network connected to it, because no current technology can guarantee their secrecy, security, and verifiability, the report says.
-
-
Why and how people forget passwords
Do you frequently forget passwords to a baffling array of accounts and websites? Much depends on a password’s importance and how often you use it, according researchers. Their study could spur improved password technology and use.
-
-
Fax machines and coffee pots – the surprising ways you could be hacked
Hopefully you protect your computers from cyberattacks. You might have anti-virus software on your phone, tablet, laptop or desktop. You might avoid using them to visit suspicious websites and carefully protect your various login details. But it’s no longer just what we typically think of as computers that are connected to the internet and so at risk of cyberattacks. And if multiple devices are connected to the same network in your home or office, then if a hacker breaks into one machine they could gain access to all of them.
-
-
The FBI launches a Combating Foreign Influence webpage
The FBI on Thursday has launched a webpage dedicated to combating foreign influence. The webpage aims to educate the public about the threats faced from disinformation campaigns, cyberattacks, and the overall impact of foreign influence on society. The FBI is the lead federal agency responsible for investigating foreign influence operations.
-
-
Russia is co-opting angry young men
It seems almost too strange to be true: fight clubs, neo-Nazi soccer hooligans, motorcycle gangs, and other violent fringe elements are serving as conduits for the Kremlin’s influence operations in Western countries. “It sounds more like an episode of The Americans with a dash of Mad Max and Fight Club mixed in,” Michael Carpenter writes, “[y]et this is exactly what is happening across Europe and North America as Russia’s intelligence services co-opt fringe radicals and angry young men to try to undermine Western democracies from within. And not just in the virtual world, but in real life.”
-
-
Unsecured, obsolete medical record systems and medical devices risk patient lives
A team of physicians and computer scientists has shown that it is easy to modify medical test results remotely by attacking the connection between hospital laboratory devices and medical record systems. These types of attacks might be more likely used against high-profile targets, such as heads of state and celebrities, than against the general public. But they could also be used by a nation-state to cripple the United States’ medical infrastructure.
-
-
Control system simulator helps operators to fight hackers
A simulator that comes complete with a virtual explosion could help the operators of chemical processing plants – and other industrial facilities – learn to detect attacks by hackers bent on causing mayhem. The simulator will also help students and researchers understand better the security issues of industrial control systems.
-
-
Fortnite is setting a dangerous security trend
Cybercriminals have just been given yet another route to get malicious software (malware) onto your personal mobile devices. The hugely popular video game Fortnite has become one of the first major apps to bypass official app stores and encourage users to download its software directly.
-
More headlines
The long view
Need for National Information Clearinghouse for Cybercrime Data, Categorization of Cybercrimes: Report
There is an acute need for the U.S. to address its lack of overall governance and coordination of cybercrime statistics. A new report recommends that relevant federal agencies create or designate a national information clearinghouse to draw information from multiple sources of cybercrime data and establish connections to assist in criminal investigations.