Beijing’s cyber operations are largely conducted in the shadows. But a recent leak has shed light on how the state is working with private companies to target online activism.
The cost of safeguarding America’s schools from cybercriminals could run as high as $5 billion.
boonchai wedmakawand via Getty Images
Nir Kshetri, University of North Carolina – Greensboro
Cybercriminals target schools because they’re uniquely vulnerable. A cybersecurity expert explores whether a new White House initiative will be enough to deter bad actors.
The government’s plan to make social media companies hand over trolls’ details aims to make it easier for victims to sue their harassers for defamation. But this conflates two very different concepts.
The pandemic is increasing society’s reliance on digital connections.
MR.Cole_Photographer/Moment via Getty Images
Much of the world is moving online in response to the coronavirus pandemic. Society’s newly increased dependence on the internet is bringing the need for good cyber policy into sharp relief.
Cyber insecurity is a threat to Africa’s digital economy.
Riccardo Mayer/Shutterstock
Indonesia is set to issue its first cyber security bill. It’s badly needed, but in its current form the legislation also create risks of abuses of power and violations of human rights.
A new act is trying to lock down cyber crime in Kenya.
Ink Drop/Shutterstock
Citizens and digital-rights advocates are pushing back against growing cyber repression in Thailand, where sharing the wrong Facebook post can land you in jail.
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia.
Army-Cyber/flickr
Richard Forno, University of Maryland, Baltimore County y Anupam Joshi, University of Maryland, Baltimore County
The country’s actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
There needs to be rules that govern what takes place in the cloud as there are for what occurs on the ground.
David James Paquin
Who’s in your network, checking out your data? The latest invasive digital creature is Sandworm, a piece of malware discovered to be using a previously unknown Windows vulnerability to infiltrate government…
Mouses not guns, a future view of the battlefield.
Carrie Kessler/USAF
President Bush is reported to have said: “When I take action, I’m not going to fire a US$2m missile at a US$10 empty tent and hit a camel in the butt. It’s going to be decisive.” As the quote suggests…
Cyber-security takes more than cautious laptop ownership.
sridgway
To my amazement, the latest Eurobarometer survey on Cyber Security across Europe received very little attention in the UK, despite its quite revealing findings. The report shows in no uncertain terms that…
The worrying developments in UK internet freedom over the last year make predictions for 2014 gloomy to say the least. Censorship now affects us all, so we should be thinking about it. And it’s not politically…
Cyber-crime knows no borders and nor should our defences.
dirkb86
Senior representatives from more than 90 governments met in Seoul recently to discuss cyber-space, including cyber-security and cyber-crime. It was the third in a series of international conferences that…
Know your enemy: trolls come in many shapes and sizes.
Dunechaser
Somewhere around 2010, the concept of trolling arrived in the national consciousness with a flurry of news stories: the hateful tweet Tom Daley received about his father during the Olympics; the defacement…
Australia’s place in the online world is changing, with significant consequences.
lintmachine
Yesterday afternoon the Australian Senate passed the Cybercrime Legislation Amendment Bill 2011 following amendments suggested by the Labor Party. It’s been more than a year since the bill was first introduced…
US authorities have seized the file-sharing website.
johntrainor
The big copyright news overnight was not the continuing protests against the Stop Online Piracy Act (SOPA) and PROTECT IP Act (PIPA), but the shutdown and seizure of Megaupload.com, a popular “cyberlocker…