What is Volt Typhoon? A cybersecurity expert explains the Chinese hackers targeting US critical infrastructure

Chinese state-sponsored hackers are targeting critical infrastructure. Here’s what they’re doing, how the US government is responding and how you can help.

Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County • conversation
March 29, 2024 ~6 min

Cybersecurity for satellites is a growing challenge, as threats to space-based infrastructure grow

The capability for attacking satellites in space using cyber technology is advancing fast

Sylvester Kaczmarek, Chief Technology Officer, Imperial College London • conversation
Feb. 20, 2024 ~8 min


MIT, Applied Materials, and the Northeast Microelectronics Coalition Hub to bring 200mm advanced research capabilities to MIT.nano

State-of-the-art toolset will bridge academic innovations and industry pathways to scale for semiconductors, microelectronics, and other critical technologies.

MIT.nano • mit
Jan. 30, 2024 ~7 min

Study: Smart devices’ ambient light sensors pose imaging privacy risk

The ambient light sensors responsible for smart devices’ brightness adjustments can capture images of touch interactions like swiping and tapping for hackers.

Alex Shipps | MIT CSAIL • mit
Jan. 29, 2024 ~8 min

Cybercrime victims who aren’t proficient in English are undercounted – and poorly protected

The federal government’s web portal for reporting cybercrimes is of little use if you have limited proficiency with English.

Fawn Ngo, Associate Professor of Criminology, University of South Florida • conversation
Jan. 29, 2024 ~7 min

The top risks from technology that we’ll be facing by the year 2040

A new study consulted futurists for their predictions about technological evolution.

Charles Weir, Research Fellow and Lecturer, Lancaster University • conversation
Jan. 23, 2024 ~7 min

Boosting faith in the authenticity of open source software

Speranza system brings hope to users that the package they download is functional software, not malware.

Steve Nadis | MIT CSAIL • mit
Dec. 11, 2023 ~9 min

The vast majority of us have no idea what the padlock icon on our internet browser is – and it's putting us at risk

The padlock symbol simply means that the data being sent between the web server and the user’s computer is encrypted and cannot be read by others. But many people don’t know that.

Fiona Carroll, Reader in Human Computer Interaction, Cardiff Metropolitan University • conversation
Nov. 22, 2023 ~6 min


Accelerating AI tasks while preserving data security

The SecureLoop search tool efficiently identifies secure designs for hardware that can boost the performance of complex AI tasks, while requiring less energy.

Adam Zewe | MIT News • mit
Oct. 30, 2023 ~9 min

Spyware can infect your phone or computer via the ads you see online – report

You probably won’t be targeted by spyware, but if you are, odds are you won’t know about it. The latest spyware slips in unseen through online ads as you go about your digital life.

Claire Seungeun Lee, Associate Professor of Criminology and Justice Studies, UMass Lowell • conversation
Sept. 22, 2023 ~7 min

/

10