FBI investigation details former CIA operative’s efforts to help Qatar’s World Cup bid, influence US policy

source: wfin.com  |  image: pexels.com

 

An FBI investigation into alleged unlawful activity to help Qatar obtain World Cup 2022 hosting privileges may have extended further to help improve Qatar’s image in the U.S. and influence U.S. policy, according to an Associated Press report.

The initial investigation focused on former CIA officer Kevin Chalker’s work to help Qatar through alleged foreign lobbying, surveillance and exporting sensitive information to undermine the country’s rivals in bidding for the World Cup, according to individuals with knowledge of the investigation.

Chalker’s company Global Risk Advisors employed a number of methods, such as a Facebook “honeypot” trap, in which an attractive woman connected with a target, or someone posed as a photojournalist to keep tabs on one nation’s bid.

Continue reading “FBI investigation details former CIA operative’s efforts…”

Microsoft Warns of Uptick in Hackers Leveraging Publicly-Disclosed 0-Day Vulnerabilities

source: thehackernews.com  |  image: pexels.com

 

Microsoft is warning of an uptick among nation-state and criminal actors increasingly leveraging publicly-disclosed zero-day vulnerabilities for breaching target environments.

The tech giant, in its 114-page Digital Defense Report, said it has “observed a reduction in the time between the announcement of a vulnerability and the commoditization of that vulnerability,” making it imperative that organizations patch such exploits in a timely manner.

This also corroborates with an April 2022 advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA), which found that bad actors are “aggressively” targeting newly disclosed software bugs against broad targets globally.

Continue reading “Microsoft Warns of Uptick in Hackers Leveraging…”

Web inventor Tim Berners-Lee wants us to ‘ignore’ Web3: ‘Web3 is not the web at all’

source: cnbc.com  |  image:  pexels.com

 

LISBON, Portugal — The creator of the web isn’t sold on crypto visionaries’ plan for its future and says we should “ignore” it.

Tim Berners-Lee, the British computer scientist credited with inventing the World Wide Web in 1989, said Friday that he doesn’t view blockchain as a viable solution for building the next iteration of the internet.

He has his own web decentralization project called Solid.

“It’s important to clarify in order to discuss the impacts of new technology,” said Berners-Lee, speaking onstage at the Web Summit event in Lisbon. “You have to understand what the terms mean that we’re discussing actually mean, beyond the buzzwords.”

Continue reading “Web inventor wants us to ‘ignore’ Web3…”

Scientists at America’s top nuclear lab were recruited by China to design missiles and drones, report says

source: nbcnews.com  |   image: pexels.com

“China is playing a game that we are not prepared for, and we need to really begin to mobilize,” said Greg Levesque, the lead author of the report by Strider Technologies.

At least 154 Chinese scientists who worked on government-sponsored research at the U.S.’s foremost national security laboratory over the last two decades have been recruited to do scientific work in China — some of which helped advance military technology that threatens American national security — according to a new private intelligence report obtained by NBC News.

The report, by Strider Technologies, describes what it calls a systemic effort by the government of China to place Chinese scientists at Los Alamos National Laboratory, where nuclear weapons were first developed.  

Many of the scientists were later lured back to China to help make advances in such technologies as deep-earth-penetrating warheads, hypersonic missiles, quiet submarines and drones, according to the report.

Continue reading “Scientists at America’s top nuclear lab were recruited by China…”

A new satellite brighter than any star could ruin the night sky

source: fastcompany.com  |  image:  pixabay.com

Another space internet provider is going to defile our skies with a satellite that looks to be brighter than everything but the moon.

How critical US sectors are coping with rising cyberattacks

source: thehill.com  |  image: pixabay.com

BY INES KAGUBARE

The rise in cyberattacks this year has forced many companies in critical sectors to make improvements to their cyber defenses in an effort to secure their networks from hacks.

Such companies are increasing their investments in cybersecurity and seeking to hire more cyber professionals — a task proving to be challenging amid a shortage of cyber workers across industries. 

The Hill spoke to several security experts and industry leaders in the financial, health care and energy sectors to gauge how those critical industries are seeking to keep their networks secure amid the growing number of cyberattacks.

In the health care sector, which has seen a spike in ransomware this year targeting hospitals and other health care facilities, Christopher Plummer, a senior cybersecurity architect at Dartmouth Health, said having a cybersecurity program is crucial for hospitals, as they hold sensitive information — including patient data. 

But he estimated that only about 10 to 20 percent of the nation’s hospitals have a dedicated cybersecurity program.

Continue reading “How critical US sectors are coping with rising cyberattacks”

How will the moon’s resources be managed?

source: fastcompany.com  | image: pixabay.com

The 2020s will be recognized as the decade humans transitioned into a truly space-faring species that utilizes space resources to survive and thrive both in space and on Earth.

It’s been 50 years since humans last visited the moon, and even robotic missions have been few and far between. But the Earth’s only natural satellite is about to get crowded.

At least six countries and a flurry of private companies have publicly announced more than 250 missions to the moon to occur within the next decade. Many of these missions include plans for permanent lunar bases and are motivated in large part by ambitions to assess and begin utilizing the moon’s natural resources. In the short term, resources would be used to support lunar missions; but in the long term, the moon and its resources will be a critical gateway for missions to the broader riches of the solar system.

But these lofty ambitions collide with a looming legal question. On Earth, possession and ownership of natural resources are based on territorial sovereignty. Conversely, Article II of the Outer Space Treaty—the 60-year-old agreement that guides human activity in space—forbids nations from claiming territory in space. This limitation includes the moon, planets, and asteroids. So how will space resources be managed?

I am a lawyer who focuses on the peaceful and sustainable use of space to benefit all humanity. I believe the 2020s will be recognized as the decade humans transitioned into a truly space-faring species that utilizes space resources to survive and thrive both in space and on Earth. To support this future, the international community is working through several channels to develop a framework for space resource management, starting with Earth’s closest neighbor, the moon. Continue reading “How will the moon’s resources be managed?”

IP Cameras, VoIP and Video Conferencing Revealed as Riskiest IoT Devices

source: infosecurity-magazine.com  |  image: pixabay.com

 

IoT devices from video conferencing systems to IP cameras are among the five riskiest IoT devices connected to networks, according to research highlighted by Forescout’s cybersecurity research arm, Vedere Labs.

The company identified recurring themes in their recent research, highlighting the growing attack surface due to more devices being connected to enterprise networks, and how threat actors are able to leverage these devices to achieve their goals.

“IP cameras, VoIP and video-conferencing systems are the riskiest IoT devices because they are commonly exposed on the internet, and there is a long history of threat actor activity targeting them,” The Forescout report said.

The attack surface now encompasses IT, IoT and OT in almost every organization, with the addition of IoMT in healthcare. Organizations must be aware of risky devices across all categories. Forescout recommends that automated controls are implement and that companies do not rely on siloed security in the IT network, OT network or for specific types of IoT devices.

This latest research provides an update to the company’s findings from 2020 in which networking equipment, VoIP, IP cameras and programmable logic controllers (PLCs) were listed and remain among the riskiest devices across IT, IoT, OT and IoMT in 2022.

However, new entries such as hypervisors and human machine interfaces (HMIs) are representative of trends including critical vulnerabilities and increased OT connectivity.

Vedere Labs analyzed device data between January 1 and April 30 in Forescout’s Device Cloud. The anonymized data comes from Forescout customer deployments and contains information about almost 19 million devices – a number that grows daily, according to the company.

The overall risk of a device was calculated based on three factors: configuration, function and behavior.

After measuring the risk of each individual device, Vedered Labs calculated averages per device type to understand which are the riskiest.

 

Caltech’s New Ultrafast Camera Captures Signals Traveling Through Nerve Cells

source: scitechdaily.com  |  image: pixels.com

Reach out right now and touch anything around you. Whether it was the wood of your desk, a key on your keyboard, or the fur of your dog, you felt it the instant your finger contacted it.

Or did you?

In actuality, takes a bit of time for your brain to register the sensation from your fingertip. However, it does still happen extremely fast, with the touch signal traveling through your nerves at over 100 miles per hour. In fact, some nerve signals are even faster, approaching speeds of 300 miles per hour.

Scientists at Caltech have just developed a new ultrafast camera that can record footage of these impulses as they travel through nerve cells. Not only that, but the camera can also capture video of other incredibly fast phenomena, such as the propagation of electromagnetic pulses in electronics.

Known as differentially enhanced compressed ultrafast photography (Diff-CUP), the camera technology was developed in the lab of Lihong Wang. He is the Bren Professor of Medical Engineering and Electrical Engineering, Andrew and Peggy Cherng Medical Engineering Leadership Chair, and executive officer for medical engineering.

Diff-CUP operates in a similar manner to Wang’s other CUP systems, which have been shown capable of capturing images of laser pulses as they travel at the speed of light and recording video at 70 trillion frames per second.

Continue reading “Caltech’s New Ultrafast Camera Captures Signals…”

‘Watched The Whole Time’: China’s Surveillance State Grows Under Xi

source: barrons.com  |  image:  pixels.com

When Chen picked up his phone to vent his anger at getting a parking ticket, his message on WeChat was a drop in the ocean of daily posts on China’s biggest social network.

But soon after his tirade against “simple-minded” traffic cops in June, he found himself in the tentacles of the communist country’s omniscient surveillance apparatus.

Chen quickly deleted the post, but officers tracked him down and detained him within hours, accusing him of “insulting the police”.

He was locked up for five days for “inappropriate speech”.

His case — one of the thousands logged by a dissident and reported by local media — laid bare the pervasive monitoring that characterises life in China today.

Its leaders have long taken an authoritarian approach to social control.

But since President Xi Jinping took power in 2012, he has reined in the relatively freewheeling social currents of the turn of the century, using a combination of technology, law and ideology to squeeze dissent and preempt threats to his rule.

Ostensibly targeting criminals and aimed at protecting order, social controls have been turned against dissidents, activists and religious minorities, as well as ordinary people — such as Chen — judged to have crossed the line.

The average Chinese citizen today spends nearly every waking moment under the watchful eye of the state.

Continue reading “‘Watched The Whole Time’: China’s Surveillance State Grows Under Xi”