• Showcasing Cybersecurity Technologies

    Twelve innovative cybersecurity technologies available for commercial licensing from four U.S. Department of Energy national laboratories will be showcased to the public during a series of free webinars starting this month.

  • U.K. Will Not Be Able to Prevent “Misuse of Data” by China if Huawei Deal Goes Ahead: U.S. Ambassador

    Robert Wood Johnson, the U.S. ambassador to the U.K., warned that if the U.K. allowed Huawei access to the U.K. 5G communication infrastructure, there would be no way for the U.K. to prevent Chinese intelligence agencies from misusing the data collected by Huawei in the course of the company’s operations. Experts say that even more worryingly, if Huawei is allowed access to the nascent U.K. 5G infrastructure, the company, with a flip of a switch, could take down the entire U.K. communication system when ordered to do so by the Chinese government.

  • Idaho Team Impresses in Girls Go CyberStart Coding Competition

    It would have been a challenge even in normal times, but a four-girl team from Skyline High School in Idaho Falls overcame quarantine and equipment issues to finish 29th in Girls Go CyberStart, a national online problem solving competition held in late May.

  • UA Little Rock to Offer New Bachelor’s Degree in Cybersecurity

    The University of Arkansas at Little Rock is introducing a new four-year degree program in cybersecurity in the fall 2021 semester to help meet the rising demand for cybersecurity professionals. The university says the new degree program will attract more government and industry jobs to the region, while helping to fill a growing need for more trained cybersecurity professionals.

  • Ensuring Complex Programs Are Bug-Free without Testing

    A team of researchers have devised a way to verify that a class of complex programs is bug-free without the need for traditional software testing. Called Armada, the system makes use of a technique called formal verification to prove whether a piece of software will output what it’s supposed to. It targets software that runs using concurrent execution, a widespread method for boosting performance, which has long been a particularly challenging feature to apply this technique to.

  • U Nevada-Reno’s programs Designated Center of Academic Excellence in Cyber Defense (CAE-CD)

    The National Security Agency (NSA) and the Department of Homeland Security (DHS) co-sponsor Centers for Academic Excellence in Cyber Defense (CAE-CD). The aim of the program is to ensure cyber defense professionals graduate from institutions of higher education with theoretical and hands-on experience in cybersecurity. After a rigorous review process, the University of Nevada-Reno’s B.S. in computer science with a minor in cybersecurity was recently designated a CAE-CD.

  • Chinese Govt.-Controlled Telecoms Operated in the U.S. with Little or No U.S. Government Oversight

    A bipartisan report released Tuesday by the Senate investigative panel found that U.S. government officials had “exercised minimal oversight” of the risks posed by three Chinese telecom companies which have operated on American communications networks for nearly twenty years. The Trump administration took steps to limit the ability if Huawei and China Telecom to operate in the United States, but U.S. officials have failed to keep an adequate watch on three other Chinese government-controlled companies — China Unicom Americas, China Telecom Americas, and ComNet (USA).

  • U.K. Set to Reverse Huawei Decision

    In a dramatic turnaround, the British government will in a few days announce that it was reversing its decision earlier this year to allow Huawei to provide components for Britain’s 5G communication infrastructure. In January, the government said it would push for a deal which would allow Huawei to supply up to 35 percent of the components of the new 5G network, and that these components would be allowed only on the “edge” of the networks, not the networks’ “core.” The government is now set to announce that Huawei’s components will not be allowed in the U.K. 5G networks, and that all of the Chinese company’s gear will be removed from older communication networks by the end of 1922. The government’s January deal would probably have failed to gain approval in parliament, as Conservative backbenchers who oppose the January deal now have more than enough votes to block it.

  • Studying Ideologically Motivated Cyberattacks

    A John Jay College of Criminal Justice project on cyberterrorism is one of 13 selected by the Department of Homeland Security as part of the National Counterterrorism Innovation, Technology, and Education (NCITE) Center, a new DHS Center of Excellence. The John Jay project will study and aggregate ideologically motivated cyberattacks and will create a new, unique dataset – the Cyber-Extremist Crime Database (Cyber-ECDB) – which will track ideologically motivated cyberattacks against U.S. targets from 1998 to present.

  • Solving “Link Discovery” Problem for Terahertz Data Networks

    When someone opens a laptop, a router can quickly locate it and connect it to the local Wi-Fi network. That ability is a basic element of any wireless network known as link discovery, and now a team of researchers has developed a means of doing it with terahertz radiation, the high-frequency waves that could one day make for ultra-fast wireless data transmission.

  • Creating Virtual Cyber Defense Tool

    Researchers are helping protect the country’s most secretly held assets through a partnership that’s creating state-of-the-art, virtual cyberattack defenses. The researchers have customized an existing MSU-designed Netmapper computer program to develop next-generation cyber learning and training software that can scan and map the military’s complex computer network infrastructures.

  • What to Make of New U.S. Actions Against Foreign Telecoms

    Recent moves by the administration mark another concrete step in the U.S. campaign to limit the digital and economic influence of Chinese telecommunications companies both within and outside U.S. borders. Justin Sherman writes that “The moves also demonstrate that current American efforts to limit the influence of the Chinese telecommunications sector are much broader than just the well-publicized targeting of Chinese telecom giant Huawei.”

  • Saving the IoT from Botnets

    The advent of the Internet of Thing, essentially smart devices with connectivity to the internet has wrought many benefits, but with it comes the problem of how to cope with third party users with malicious or criminal intent.

  • Tackling 5G-Based Mobile, Cloud Computing Security Concerns

    The sheer number and wide variety of devices connected via 5G mobile networks demand differentiated security solutions. SMU Professor Robert Deng points to the need to ask the right questions, and a multiparty approach to create effective solutions.

  • U.K.: Tory MPs Rebel against Government’s Huawei’s Plan

    The U.K. government has launched an all-hands-on-deck effort to contain a growing rebellion by Tory MPs who want to ban the use of Huawei’s equipment in the U.K. 5G telecoms network, arguing that allowing the Chinese company, with its close ties to China’s intelligence and military establishments, any access to the country’s communication infrastructure would be like inviting a fox to guard the hen house.