Richard Forno, University of Maryland, Baltimore County and Anupam Joshi, University of Maryland, Baltimore County
The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Your phone’s just sitting there, innocently….
Tabletop image via www.shutterstock.com.
Bad guys or law enforcement could hack into our networked gadgets to spy on everything we do – and it's not clear how a laptop's video camera or an Amazon Echo fits within wiretapping laws.
Australian Prime Minister Malcolm Turnbull announces the federal government’s Cyber Security Strategy today.
AAP Image/Dean Lewins
Hackathons are all the rage, but if the participants follow through on the results, they can be a powerful instrument for generating innovation.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
REUTERS/Lucy Nicholson
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough?
Colin
Nir Kshetri, University of North Carolina – Greensboro
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
Your broadband router might not look like much, but it’s your first line of defence against cyber attack.
Matt J Newman/Flickr
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
There are reports that China-based hackers have compromised the Bureau of Meteorology. If so, what would this mean for the BOM and government security?
Your laptop needs you!
gualtiero boffi/shutterstock.com
Cyber criminals have found a way to harvest data from iPhones and iPads using the weak point in Apple's otherwise top security system - app developers.
Apple’s ‘walled garden’ might be frustrating, but it does protect your devices from being hacked.
Faris Algosaibi/Flickr
Responsable du département Réseaux et Services de Télécommunications à Télécom SudParis, Télécom SudParis – Institut Mines-Télécom, Université Paris-Saclay