Articles on Cybersecurity

Displaying 1 - 20 of 233 articles

Scholars have ideas about how to help solve our password problems. vladwei/Shutterstock.com

Using truly secure passwords: 6 essential reads

A roundup of research into what makes passwords secure, and options for new standards of login authentication.
As the iPhone X rolls out, there are plenty of security expectations and concerns waiting to be verified by users and researchers. REUTERS/Stephen Lam

Face ID and iOS 11: a few lingering security questions about the new iPhone X

While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
For safety, look to text-only messaging. The Conversation, via picascii.com, publicdomainpictures.net and kelvinsong

The only safe email is text-only email

It's impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It's time to return to plain, text-only email.
Embedded medical devices will continue to be vulnerable to cybersecurity threats. The pacemaker depicted is not made by Abbott’s. REUTERS/Fabrizio Bensch

Three reasons why pacemakers are vulnerable to hacking

Pacemakers are Internet of Things devices for the human body, but they're still not particularly secure.
Make it longer than 12 characters! selinofoto/Shutterstock.com

Choose better passwords with the help of science

Recent federal changes to password-strength guidelines echo the findings of research we've been doing. It's time to think differently about what makes a password secure.
Looking inside a quantum computer. IBM Research

How quantum mechanics can change computing

As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.
Taking a much closer look at what’s going on inside malware. MuchMania/Shutterstock.com

Inside the fight against malware attacks

How do malware analysts examine software that's designed to wreak havoc with computers? By using tools that watch software's inner workings very closely.

Top contributors

More