Menu Fermer

Articles sur Hacking

Affichage de 101 à 120 de 262 articles

Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017. (Yun Dong-jin/Yonhap via AP)

Ransomware like Bad Rabbit is big business

Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches. Mark Warner/Flickr

Why we need to improve cloud computing’s security

Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
WPA2 has been cracked, so it’s time to update your router. Ksander/Shutterstock

Wi-Fi can be KRACK-ed. Here’s what to do next

KRACK can only be used in certain circumstances, and there are some steps you can take to keep your internet traffic safe.
U.S. President Donald Trump has taught the world many lessons since his time in office – mostly on how not to govern. (AP Photo/Carolyn Kaster)

All the lessons Donald Trump has taught us

Love him or hate him, Donald Trump has shown us a great deal in his short time on the political stage. For that, we should be grateful. Here are the lessons taught by Prof. Trump.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack. (Shutterstock)

World War Three is being waged in cyberspace

Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they’re doing it with bits and bytes. It’s Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
South African Deputy President Cyril Ramaphosa claims the country’s security agencies hacked his emails. GCIS

Leaked emails: Ramaphosa’s hypocrisy on spying by the South African state

It would be no surprise if Deputy President Cyril Ramaphosa’s claims of the state spying on him turn out to be true. After all, state spy agencies have been abused before in ANC factional battles.
Embedded medical devices will continue to be vulnerable to cybersecurity threats. The pacemaker depicted is not made by Abbott’s. REUTERS/Fabrizio Bensch

Three reasons why pacemakers are vulnerable to hacking

Pacemakers are Internet of Things devices for the human body, but they’re still not particularly secure.
Voice authentication technology could be used to increase blockchain security. Merrill College of Journalism/flickr

The blockchain could have better security than the banks

Providing security in the blockchain would convert into a degree of predictability in the technology. If this was shown to work in the long term, it would also create trust.
A subject plays a computer game as part of a neural security experiment at the University of Washington. Patrick Bennett

Helping or hacking? Engineers and ethicists must work together on brain-computer interface technology

BCI devices that read minds and act on intentions can change lives for the better. But they could also be put to nefarious use in the not-too-distant future. Now’s the time to think about risks.

Les contributeurs les plus fréquents

Plus