Universities hold valuable information but are large and porous communities, with legacy IT systems often adding to the risks. But following a few basic rules can help counter cyber attacks.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding ‘backdoors’ to encryption algorithms weakens everyone’s security. So what are the police and intelligence agencies to do?
At CIA headquarters on Jan. 17, Trump said the ‘dishonest media’ made it appear he was having a feud with the intel community.
Olivier Douliery/AP via CNP
The president, the press and the public have misguided ideas about how intelligence is produced and analyzed. A Georgetown professor sets us straight.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
REUTERS/Lucy Nicholson
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect’s iPhone?
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
Throwing a safety net over one’s computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Reuters
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.