-
Improving Recovery of Critical Systems after Cyberattacks
Researchers aim to develop fast, accurate and efficient recovery mechanisms that, when coupled with the expeditious damage assessment techniques he has already developed, will offer an “integrated suite solution.” This will allow affected CI systems to continue running while providing as many critical functionalities as possible.
-
-
Ukraine Warns of Looming Russian Cyberattacks
Ukraine is again urging its companies and private organizations to immediately bolster their cybersecurity ahead of what could be a new wave of Russian attacks. The government advisory further warned that the vulnerabilities could allow Russia to launch a renewed series of targeted cyberattacks on Ukraine aimed at disabling communication and information systems.
-
-
How Can Countries Protect Critical Infrastructure from Cyberattacks?
Hacking attacks on power grids, telecom networks, or governments can paralyze entire societies. That makes them a powerful military weapon, as the war in Ukraine demonstrates. How can countries protect themselves?
-
-
Thinking Like a Cyberattacker to Protect User Data
A component of computer processors that connects different parts of the chip can be exploited by malicious agents who seek to steal secret information from programs running on the computer. Researchers develop defense mechanisms against attacks targeting interconnection of chips in computers.
-
-
More Governments Use Spyware to Monitor Their People, Compromising Privacy
The right to privacy is under siege as an increasing number of governments are using spyware to keep tabs on their people. Many governments are using modern digital networked technologies to monitor, control and oppress their populations.
-
-
EFF’s “Cover Your Tracks” Will Detect Your Use of iOS 16’s Lockdown Mode
Apple’s new iOS 16 offers a powerful tool for its most vulnerable users. Lockdown Mode reduces the avenues attackers have to hack into users’ phones by disabling certain often-exploited features. But there is a catch.
-
-
Three Iranian Nationals Charged with Cyber Plots Against U.S. Critical Infrastructure Providers
An indictment was unsealed Wednesday charging three Iranian nationals with allegedly orchestrating a scheme to hack into the computer networks of multiple U.S. victims, including critical infrastructure providers. The defendants’ hacking campaign exploited known vulnerabilities in commonly used network devices and software applications to gain access and exfiltrate data and information from victims’ computer systems.
-
-
Off-the-Shelf Crypto-Detectors Give a False Sense of Data Security
A team of computer scientists outlines a leading reason behind insecure data and makes recommendations about how to fix the problem.
-
-
Risks of North Korean Chemical, Biological Weapons; EMP; and Cyber Threats
What WMD and cyber capabilities does North Korea currently have? How does North Korea use or threaten to use these capabilities? What are North Korea’s goals in employing its WMD and cyber capabilities? What impact could this use have? How can the ROK-U.S. rein in and defeat the North’s WMD and cyber capabilities?
-
-
Quantum Computing Vulnerabilities of National Critical Functions
How are the national critical functions (NCFs) vulnerable to future quantum computing capabilities? How should the federal government prioritize assistance to critical infrastructure owners and operators?
-
-
Prioritizing Cybersecurity Risk in Election Infrastructure
How can jurisdictions at each level prioritize their efforts to combat the risk of cyberattacks on their election systems? How can they assess the likelihood of a successful attack? How can they assess the scale and severity of an attack?
-
-
Former U.S. Cyber Command and NSA Chief Makes the Case for a Cyber Competition Strategy
Former U.S. National Security Agency and U.S. Cyber Command boss Mike Rogers asks: “What is our vision of the key technologies, the most critical sectors that are really going to drive economic advantage … and [that] if placed at risk would cause us harm, [and] what are the policies we need to create advantage for ourselves?” A new cybersecurity strategy based on what is required to become and remain competitive, secure and resilient should focus on this central question.
-
-
Thinking Like a Cyber-Attacker to Protect User Data
Researchers found that an understudied component of computer processors is susceptible to attacks from malicious agents. Then, they developed mitigation mechanisms.
-
-
Rise of Precision Agriculture Exposes Food System to New Threats
Farmers are adopting precision agriculture, using data collected by GPS, satellite imagery, internet-connected sensors and other technologies to farm more efficiently. These practices could help increase crop yields and reduce costs, but the technology behind the practices is creating opportunities for extremists, terrorists and adversarial governments to attack farming machinery, with the aim of disrupting food production.
-
-
NSF Grants to Protect Data, User privacy
Researchers are working on two new cybersecurity projects, recently funded by the National Science Foundation, to ensure trustworthy cloud computing and increase computing privacy for marginalized and vulnerable populations.
-
More headlines
The long view
Ransomware Attacks: Death Threats, Endangered Patients and Millions of Dollars in Damages
A ransomware attack on Change Healthcare, a company that processes 15 billion health care transactions annually and deals with 1 in 3 patient records in the United States, is continuing to cause massive disruptions nearly three weeks later. The incident, which started on February 21, has been called the “most significant cyberattack on the U.S. health care system” by the American Hospital Association. It is just the latest example of an increasing trend.
Chinese Government Hackers Targeted Critics of China, U.S. Businesses and Politicians
An indictment was unsealed Monday charging seven nationals of the People’s Republic of China (PRC) with conspiracy to commit computer intrusions and conspiracy to commit wire fraud for their involvement in a PRC-based hacking group that spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives.
Autonomous Vehicle Technology Vulnerable to Road Object Spoofing and Vanishing Attacks
Researchers have demonstrated the potentially hazardous vulnerabilities associated with the technology called LiDAR, or Light Detection and Ranging, many autonomous vehicles use to navigate streets, roads and highways. The researchers have shown how to use lasers to fool LiDAR into “seeing” objects that are not present and missing those that are – deficiencies that can cause unwarranted and unsafe braking or collisions.