A better kind of cybersecurity strategy

New model shows why countries that retaliate too much against online attacks make things worse for themselves.

Peter Dizikes | MIT News Office • mit
Dec. 10, 2020 ~7 min

Saurabh Amin: Striving to make our infrastructure safer

The systems engineer focuses on making transportation, electricity, and water infrastructure more resilient against disruptions.

David L. Chandler | MIT News Office • mit
Dec. 6, 2020 ~7 min


Helping companies prioritize their cybersecurity investments

By securely aggregating sensitive data from cyber-attacks, the SCRAM platform from MIT CSAIL can quantify an organization’s level of security and suggest what to prioritize.

Adam Conner-Simons | MIT CSAIL • mit
Sept. 3, 2020 ~7 min

Algorithm quickly simulates a roll of loaded dice

Approach for generating numbers at random may help analyses of complex systems, from Earth’s climate to financial markets.

Steve Nadis | MIT News correspondent • mit
May 28, 2020 ~8 min

Zoom security: I've researched problems with video conferencing for years – here's what you need to know

Do you need a new video conferencing provider?

Thomas Reisinger, PhD Candidate in Cyber Security, De Montfort University • conversation
May 1, 2020 ~7 min

Bluetooth signals from your smartphone could automate Covid-19 contact tracing while preserving privacy

A system that enables smartphones to transmit “chirps” to nearby devices could notify people if they have been near an infected person.

Kylie Foy | Lincoln Laboratory • mit
April 8, 2020 ~10 min

Coronavirus pandemic has unleashed a wave of cyber attacks – here's how to protect yourself

Emails offering advice about COVID-19 might actually be "phishing" attacks trying to steal your data.

Chaminda Hewage, Reader in Data Security, Cardiff Metropolitan University • conversation
March 31, 2020 ~5 min

Working from home risks online security and privacy – how to stay protected

Beware the #WorkFromHome selfie.

Jason Nurse, Assistant Professor in Cyber Security, University of Kent • conversation
March 26, 2020 ~6 min


Protecting sensitive metadata so it can’t be used for surveillance

System ensures hackers eavesdropping on large networks can’t find out who’s communicating and when they’re doing so.

Rob Matheson | MIT News Office • mit
Feb. 26, 2020 ~8 min

Cryptographic “tag of everything” could protect the supply chain

Tiny, battery-free ID chip can authenticate nearly any product to help combat losses to counterfeiting.

Rob Matheson | MIT News Office • mit
Feb. 20, 2020 ~8 min

/

6