• WIRELESS NETWORK SECURITYDiscovery Highlights ‘Critical Oversight’ in Perceived Security of Wireless Networks

    By Marcy de Luna

    Researchers have uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street.

  • CYBERSECURITYARPA-H Announces Program to Enhance and Automate Cybersecurity for Health Care Facilities

    The Advanced Research Projects Agency for Health (ARPA-H) announced the launch of the Universal PatchinG and Remediation for Autonomous DEfense (UPGRADE) program, a cybersecurity effort that will invest more than $50 million to create tools for information technology (IT) teams to better defend the hospital environments they are tasked with securing.

  • CYERSECURITYUniversity Students Tackle Adventure in CyberForce — Conquer the Hill Competition

    University of Central Florida’s Cameron Whitehead wins CyberForce Conquer the Hill: Adventure Competition 2024. Whitehead was one of 112 students from 71 accredited U.S. colleges and universities who competed virtually to complete work-based cybersecurity tasks and challenges during a full day of energy sector-related adventure.

  • CYBERSECURITY EDUCATIONCybersecurity Education Varies Widely in U.S.

    By Tina Hilding

    Cybersecurity programs vary dramatically across the country, a review has found. The authors argue that program leaders should work with professional societies to make sure graduates are well trained to meet industry needs in a fast-changing field.

  • CYBERSECURITYU.S. Needs a New Independent Armed Service — a U.S. Cyber Force: Report

    In the U.S. military, an officer who had never fired a rifle would never command an infantry unit. Yet officers with no experience behind a keyboard are commanding cyber warfare units. This should change, as the need to create a new independent armed service — a U.S. Cyber Force – become more urgent by the day.

  • ELECTION SECURITYStates Rush to Combat AI Threat to Elections

    By Zachary Roth

    This year’s presidential election will be the first since generative AI became widely available. That’s raising fears that millions of voters could be deceived by a barrage of political deepfakes. Congress has done little to address the issue, but states are moving aggressively to respond — though questions remain about how effective any new measures to combat AI-created disinformation will be.

  • CYBERDETERRENCETantalizing Method to Study Cyberdeterrence

    By Trina West

    Tantalus is unlike most war games because it is experimental instead of experiential — the immersive game differs by overlapping scientific rigor and quantitative assessment methods with the experimental sciences, and experimental war gaming provides insightful data for real-world cyberattacks.

  • THREATS TO INFRASTRUCTUREHouthi Attacks in Red Sea Threaten Internet Infrastructure

    By Nik Martin

    The recent attack on the cargo ship Rubymar by the Iran-backed Houthis caused the crew to drop anchor, which damaged undersea internet cables, the US has said. Could the vital infrastructure now become a regular target?

  • CYBERSECURITYCollegiate Cyber Defenders Shine in Inaugural Conquer the Hill — Command Edition Competition

    By Michael Kooi

    Seventy-five college students competed to test their skills in the fundamentals of IT and cybersecurity infrastructure. The DOE’s CyberForce Program aims to help develop a pipeline of skilled cyber defenders for the energy sector through competitions, webinars, career fairs, and resources for building skills.

  • CYBERSECURITY EDUCATION$2.6 Million NSF Grant for FAU’s CyberCorps Student Scholarship Program

    A $2.6 million grant from the National Science Foundation (NSF) will allow FAU to establish a scholarship program in the rapidly growing field of cybersecurity. The program is managed by the NSF and DHS. Designed to increase the volume and strength of the nation’s cybersecurity workforce, the program provides full scholarships and stipends to students pursuing studies at the intersection of cybersecurity and AI.

  • CYBERSECURITYUVA Engineering Researcher Has Plan to Defeat the Next Big Cyberattack

    By Sara Novak

    “Zero-day attacks” are the cyberattacks that disable large-scale computer programs, catching their victims off guard. In recent years, they’ve been happening more often and have become increasingly difficult to fix. From zero-day to ransomeware attacks, UVA’s Ashish Venkat believes cybersecurity should be fast and affordable for all.

  • CYBERSECURITYComputer Scientists Awarded $3M to Bolster Cybersecurity

    By Louis DiPietro

    A $3 million grant from the DARPA, the research and development arm of the U.S. Department of Defense, aims to leverage reinforcement learning to make computer networks stronger, dynamic and more secure.

  • CYBERSECURITY EDUCATIONCyber Defenders: Interns Take on National Security Challenges

    By Mollie Rappe

    Over the past two decades, nearly 500 undergraduates and graduate students in cybersecurity, computer science, computer engineering and related fields have worked on research projects, attended training courses and technical tours while receiving mentorship and unparalleled networking opportunities.

  • SURVEILLANCEApple and Google Are Introducing New Ways to Defeat Cell Site Simulators, But Is it Enough?

    By Cooper Quintin

    Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware.

  • CYERSECURITYFuture-Proof Security Architecture for Healthcare Communications

    Electronic patient records, digital medication plans, e-prescriptions: These applications are all key elements of the telematics infrastructure (TI). Germany’s telematics infrastructure (TI) aims to allow healthcare professionals to exchange patient data securely, rapidly and from anywhere. The platform for healthcare applications will soon see a new, flexible and therefore future-proof security architecture.