Menu Close

Articles on Hackers

Displaying 21 - 40 of 117 articles

A vulnerability in Log4j, a humble but widespread piece of software, has put millions of computers at risk. SOPA Images/LightRocket via Getty Images

What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what’s at stake

Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Biomedical research relies on large amounts of genomic data, which has to be protected from revealing people’s identities. AP Photo/Jerome Delay

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

Keeping biomedical data private is important, but so is sharing it for research. Game theory can help researchers accomplish both.
Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off. WhataWin/iStock via Getty Images

How vulnerable is your personal information? 4 essential reads

Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it. Alan de la Cruz via Unsplash

Shape-shifting computer chip thwarts an army of hackers

Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense. Fort George G. Meade Public Affairs Office/Flickr

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem

Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense. Fort George G. Meade Public Affairs Office/Flickr

The SolarWinds hack was all but inevitable – why national cyber defense is a ‘wicked’ problem and what can be done about it

Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.
Shutterstock

Can I still be hacked with 2FA enabled?

Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.

Top contributors

More