Menu Close

Artikel-artikel mengenai Hacking

Menampilkan 141 - 160 dari 262 artikel

Seeking a peaceful handover of power between parties and political opponents. Jim Young/Reuters

Election legitimacy at risk, even without a November cyberattack

It’s true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
Cybersecurity risks increase with the amount of outsourcing a company does. Dave Hunt/AAP

Business Briefing: hack-proof, how business can stay ahead in cybersecurity

Business Briefing: hack-proof, how business can stay ahead in cybersecurity The Conversation15,3 MB (download)
Businesses are going about cybersecurity the wrong way and need to go back to the question: what are you trying to protect?
Is everything on the up-and-up here? Rick Wilking/Reuters

How vulnerable to hacking is the US election cyber infrastructure?

With the DNC email leak and Trump calling on Russia to hack Clinton’s emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia. Army-Cyber/flickr

America is ‘dropping cyberbombs’ – but how do they work?

The country’s actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Your phone’s just sitting there, innocently…. Tabletop image via www.shutterstock.com.

Your devices’ latest feature? They can spy on your every move

Bad guys or law enforcement could hack into our networked gadgets to spy on everything we do – and it’s not clear how a laptop’s video camera or an Amazon Echo fits within wiretapping laws.
Australian Prime Minister Malcolm Turnbull announces the federal government’s Cyber Security Strategy today. AAP Image/Dean Lewins

Individuals not the priority in the Cyber Security Strategy

The Australian Government’s Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing. REUTERS/Lucy Nicholson

Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’

Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect’s iPhone?
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough? Colin

Why the IRS was just hacked – again – and what the feds can do about it

Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.

Kontributor teratas

Lebih banyak