Menu Close

Artikel-artikel mengenai Hackers

Menampilkan 21 - 40 dari 119 artikel

The Department of Justice indicted six officers of Russia’s GRU military intelligence service in October 2020 on charges of hacking and deploying malware. Andrew Harnik - Pool/Getty Images

Russia could unleash disruptive cyberattacks against the US – but efforts to sow confusion and division are more likely

Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
A vulnerability in Log4j, a humble but widespread piece of software, has put millions of computers at risk. SOPA Images/LightRocket via Getty Images

What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what’s at stake

Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Biomedical research relies on large amounts of genomic data, which has to be protected from revealing people’s identities. AP Photo/Jerome Delay

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

Keeping biomedical data private is important, but so is sharing it for research. Game theory can help researchers accomplish both.
Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off. WhataWin/iStock via Getty Images

How vulnerable is your personal information? 4 essential reads

Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it. Alan de la Cruz via Unsplash

Shape-shifting computer chip thwarts an army of hackers

Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense. Fort George G. Meade Public Affairs Office/Flickr

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem

Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense. Fort George G. Meade Public Affairs Office/Flickr

The SolarWinds hack was all but inevitable – why national cyber defense is a ‘wicked’ problem and what can be done about it

Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.

Kontributor teratas

Lebih banyak