There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine.
Russian Defense Ministry Press Service via AP
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
Defending against cyberattacks increasingly means looking for patterns in large amounts of data – a task AI was made for.
Yuichiro Chino/Moment via Getty Images
Artificial intelligence is emerging as a key cybersecurity tool for both attackers and defenders.
The Department of Justice indicted six officers of Russia’s GRU military intelligence service in October 2020 on charges of hacking and deploying malware.
Andrew Harnik - Pool/Getty Images
Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
Shortly after taking office, President Biden declared that the the U.S. would no longer roll over in the face of Russian cyberattacks.
AP Photo/Evan Vucci
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Biomedical research relies on large amounts of genomic data, which has to be protected from revealing people’s identities.
AP Photo/Jerome Delay
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
The black market for stolen personal information motivates most data breaches.
aleksey-martynyuk/iStock via Getty Images
A thriving black market for stolen personal data makes millions of people vulnerable to spies, spammers, scammers and hackers.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
It’s been revealed that Prime Minister Boris Johnson’s personal phone number has been published online for 15 years.
Reuters/Alamy
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Commercial software is vital to all of our cybersecurity. What should governments do if they find it has weaknesses?
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Organizations are more vulnerable to cyber-attacks as employees work from home.
(Shutterstock)
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.