SpaceX and other companies are rushing to put thousands of small, inexpensive satellites in orbit, but pressure to keep costs low and a lack of regulation leave those satellites vulnerable to hackers.
You’re at the airport, or on the bus, and your phone’s low on juice so you plug into a nearby USB port. But you could be getting more than a power boost - some ports are booby-trapped with malware.
Around the world, elections are under attack. U.S. officials could learn from other countries about how to ensure everyone’s vote is recorded and counted accurately.
The Iranian military operates cyber espionage and sabotage through a network of dozens of contractors, allowing the state to attack foes while denying involvement.
Less overt than conventional military actions, cyber attacks can have dangerous consequences – especially when they target critical infrastructure systems controlled by the private sector.
Research shows we’re pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
The Russian government would like to free itself from the global Internet. This push for “digital sovereignty” has raised technical scepticism and political concerns.
We have not been able to develop an intelligence workforce that can keep up with the speed of advancing technologies and their threat to our national security.
PayID has been misused and compromised in various ways since its 2018 launch. The system deals only in “incoming” payments, not outgoing ones – but that doesn’t mean users are safe from cyber crime.
Indonesia is set to issue its first cyber security bill. It’s badly needed, but in its current form the legislation also create risks of abuses of power and violations of human rights.
Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There’s less attention to the dangers of cyberattacks, which could cripple key utilities.
A Nobel Prize-winning political economist found a way to promote good governance and protect users without the need for heavy-handed government regulation.