cybersecurity

  • Unmasking the Invisible Threat: Corporate America’s Battle Against AI Deepfakes

    Unmasking the Invisible Threat: Corporate America’s Battle Against AI Deepfakes

    In a stark demonstration of technological manipulation, the National Stock Exchange of India (NSE) recently faced a sophisticated deepfake scheme targeting its top leadership. CEO Ashishkumar Chauhan unwittingly became the subject of AI-generated videos meant to mislead investors and potentially manipulate stock market sentiments. Cybercriminals leveraged advanced artificial intelligence to…

  • Is TikTok a National Security Threat?

    Is TikTok a National Security Threat?

    On March 7th, 2023, a bipartisan group of senators introduced a bill to empower the Department of Commerce to ban the popular short video app TikTok. Over the past two years, the Federal Government has beleaguered TikTok, owned by the China-based company ByteDance. TikTok is the target of investigation because…

  • Data Breach Notifications Are Too Complex

    Data Breach Notifications Are Too Complex

    The meteoric rise of electronic transactions has resulted in Americans becoming increasingly vulnerable to data breaches. Data breaches can cause grave harm to the consumer, potentially resulting in identity theft and causing significant monetary loss. In 2017 alone, over 2 billion records were breached, costing impacted consumers $1,000 on average.…

  • Election Interference: A Conversation on the Steps to a More Secure Democracy

    Election Interference: A Conversation on the Steps to a More Secure Democracy

    Maurice Turner serves as the Deputy Director of the Internet Architecture Project at the Center for Democracy & Technology, a Washington, D.C.-based non-profit advocacy organization dedicated to ensuring an open, innovative, and free internet. Prior to his current role, Turner served on the Republican staff of the Senate Committee on…

  • Hackers on the Highway: Are We Prepared?

    Hackers on the Highway: Are We Prepared?

    Information and communications technology (ICT) previously enabled advancements from wireless phone calls to social networking. Recent breakthroughs have connected cars to the ICT network, allowing them to be controlled from a distance and to transmit data to remote locations. These cars contain computing and communications systems that enable them to…

  • “You Can’t Hack a Piece of Paper”: Jake Braun Talks U.S. Election Security

    “You Can’t Hack a Piece of Paper”: Jake Braun Talks U.S. Election Security

    The 2016 hacking of the Democratic National Committee (DNC) provided an urgent and long-overdue wake-up call: U.S. balloting systems are not secure. In the run-up to the 2018 midterm elections and the 2020 presidential race, election security and cyber hygiene have never been more controversial—nor more important. The revelation that…

  • Exceptional Access: How a “Back Door” Could Create Large-Scale Security Threats

    Exceptional Access: How a “Back Door” Could Create Large-Scale Security Threats

    On February 16, 2016, Tim Cook, the CEO of Apple, issued a letter to customers in which he declared his opposition to a federal court order requiring the company to help the FBI “unlock” an iPhone used by one of the two gunmen in the San Bernardino, California, mass shooting in…

  • Knock Knock, Brussels: Fortress Europa’s growing cybersecurity firewall

    Knock Knock, Brussels: Fortress Europa’s growing cybersecurity firewall

    Representatives from around the EU gather in Brussels to discuss the future of cybersecurity policy and cooperation.

  • Biometrics and Artificial Neural Networks: How Big Data Collection Works in Your Favor

    Biometrics and Artificial Neural Networks: How Big Data Collection Works in Your Favor

    Experimental research reveals that biometrics matched with artificial computers can help generate significantly more accurate security measures.