-
CYBERSECURITYIs DOGE a Cybersecurity Threat? Explaining the Dangers of Violating Protocols and Regulations That Protect Government Computer Systems
Teams from the Department of Government Efficiency (DOGE) are dropping into federal agencies with a practically unlimited mandate to reform the federal government in accordance with recent executive orders. As a 30-year cybersecurity veteran, I find the activities of DOGE thus far concerning. Its broad mandate across government, seemingly nonexistent oversight, and the apparent lack of operational competence of its employees have demonstrated that DOGE could create conditions that are ideal for cybersecurity or data privacy incidents that affect the entire nation.
-
-
CYBERSECURITYFive Cybersecurity Tips to Protect Yourself from Scams and Deepfakes
In an age where misinformation and deepfakes blur the lines between fact and fiction, identifying scams has never been more challenging. Cybersecurity experts share their top tips to help you protect yourself and your loved ones from scams and identity theft.
-
-
CHINA WATCHChinese Vessel Suspected of Severing Submarine Cables Still Anchored in Baltic Sea
European allies in the Baltic region are investigating how two fiber-optic data cables were severed earlier this week, with suspicion falling on a Chinese vessel in the area. Germany has said the incident was clearly sabotage.
-
-
DEEPFAKES & THE ELECTIONVoters: Here’s How to Spot AI “Deepfakes” That Spread Election-Related Misinformation
For years, people have spread misinformation by manipulating photos and videos with tools such as Adobe Photoshop. These fakes are easier to recognize, and they’re harder for bad actors to replicate on a large scale. Generative AI systems, however, enable users to create content quickly and easily. Domestic and foreign adversaries can use deepfakes and other forms of generative AI to spread false information about a politician’s platform or doctor their speeches.
-
-
CYBERSECURITYCyberForce Competition Challenges College Students to Use Cybersecurity Skills to Defend Their Wind Energy System
College teams will work to outsmart a simulated attack on a U.S. wind energy plant. The CyberForce Competition offers students hands-on experience, igniting their passion for cybersecurity.
-
-
UNDERSEA CABLESSubsea Communications Cables: Vital but Vulnerable
Ensuring the resilience of the submarine cable network against disruptions is crucial. Lying deep on the ocean floor, these fiber-optic cables can transmit massive amounts of data at high speeds with low latency, making them far more efficient than satellites, which handle only a fraction of global data transmission.
-
-
ISRAEL’S PAGER ATTACKWhat We've Learned About the Hungarian, Bulgarian, and Norwegian Links To Hezbollah's Pagers
A Bulgarian company with Norwegian links has surfaced in the supply chain of the pagers that detonated in Lebanon this week, killing 37 people and injuring several thousand others. The pagers, which were being used by members of Hezbollah, Iran’s most powerful proxy in the Middle East and designated as a terrorist organization by the United States, exploded simultaneously across Lebanon on September 17.
-
-
ISRAEL’S PAGER ATTACKPagers and Walkie-talkies Over Cellphones – a Security Expert Explains Why Hezbollah Went Low-Tech for Communications
In general, I believe the adversary in an asymmetric conflict using low-tech techniques, tactics and technology will almost always be able to operate successfully against a more powerful and well-funded opponent. But from a cybersecurity perspective, Israel’s attack on Hezbollah’s pagers shows that any device in your life can be tampered with by an adversary at points along the supply chain – long before you even receive it.
-
-
CYBERSECURITYCybersecurity Suite Now on Duty Defending the Nation
For the better part of a decade, dozens of Sandia engineers, each working on pieces of a new national security tool alongside federal partners, have revolutionized cybersecurity forensics with the Thorium platform and tool suite.
-
-
CYBERSECURITYComputer Scientists Discover Vulnerabilities in a Popular Security Protocol
A widely used security protocol that dates back to the days of dial-up Internet has vulnerabilities that could expose large numbers of networked devices to an attack and allow an attacker to gain control of traffic on an organization’s network.
-
-
ARGUMENT: VULNERALE INFRASTRUCTUREIt Is Time to Act
There is, in a basic sense, nothing new to be said about the global computer outage of the week just pas, Dan Geer writes, so the time to act is now. “If we choose to act on what we know, then we also know that security policy and competition policy are henceforth conjoined. We cannot and will not have zero cascade failures if any tech is allowed to become universal, to become a monopoly in its sphere.”
-
-
IT INFRASTRUCTUREMassive IT Outage Spotlights Major Vulnerabilities in the Global Information Ecosystem
The global information technology outage on July 19, 2024, that paralyzed organizations ranging from airlines to hospitals and even the delivery of uniforms for the Olympic Games represents a growing concern for cybersecurity professionals, businesses and governments.
-
-
CYBERSECURITYFrom Iron Dome to Cyber Dome: Defending Israel’s Cyberspace
In response to growing attacks against its infrastructure by formidable adversaries like Iran and its proxies, Israel recently announced that they are building a ‘cyber-dome’ or a digital ‘Iron Dome’ system to protect Israel’s cyberspace to defend against online attacks.
-
-
DEMOCRACY WATCHSupreme Court Rules Platforms Have First Amendment Right to Decide What Speech to Carry, Free of State Mandates
The Supreme Court last week correctly found that social media platforms, like newspapers, bookstores, and art galleries before them, have First Amendment rights to curate and edit the speech of others they deliver to their users, and the government has a very limited role in dictating what social media platforms must and must not publish.
-
-
WIRELESS NETWORK SECURITYDiscovery Highlights ‘Critical Oversight’ in Perceived Security of Wireless Networks
Researchers have uncovered an eavesdropping security vulnerability in high-frequency and high-speed wireless backhaul links, widely employed in critical applications such as 5G wireless cell phone signals and low-latency financial trading on Wall Street.
-