Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here’s the state of election cybersecurity.
Universities hold valuable information but are large and porous communities, with legacy IT systems often adding to the risks. But following a few basic rules can help counter cyber attacks.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
Vulnerable websites are popping up as organizations move online during the coronavirus pandemic – and hackers have more time at home alone. The result is more websites falling victim to defacement.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard.
U.S. Air Force photo by J.M. Eddins Jr.
Benjamin Jensen, American University School of International Service e Chris Inglis, United States Naval Academy
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it’s time to change that.
The proliferation of smart devices including healthcare devices means the health system is vulnerable to cyber attacks.
The Conversation US | Motion Array
The coronavirus pandemic lays bare the many vulnerabilities created by society’s dependence on the internet. Watch the video to learn more about these issues.
Amazon says it has considered adding facial recognition technology to its Ring doorbell cameras. Some politicians are concerned Ring’s video-sharing partnerships with police departments encroach on people’s privacy and civil liberties.
THE ASSOCIATED PRESS/Jessica Hill
Amazon says it’s the “new neighbourhood watch” but Ring may just be another technology that gives police too much data and lets neighbourhoods double down on their biases.
LifeLabs paid a ransom for the retrieval of 15 million health records.
THE CANADIAN PRESS/Cole Burston
Government privacy commissioners are investigating a data breach at one of Canada’s largest medical services companies, after hackers gained access to the personal information of 15 million customers.
As our worlds are become increasingly digitised, we’re starting to rely more on machines and devices for everyday tasks. But in an age when even pacemakers can be hacked, how do we know when and who to trust?
SHUTTERSTOCK
Research shows we’re pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Are military drones a security threat to their own operators?
Gorodenkoff/Shutterstock
Drones are now an integral part of defence force capability, from intelligence gathering to unmanned theatre engagement. But what happens if our own technology is turned against us?
A spider’s web is secure, and ours?
Robert Anasch/Unsplash
The announcement of a systemic attack on the Internet in February 2019 raises the question of the structure and protection of one of the major protocols of the web: the domain name service (DNS).
Don’t wait - update your phone’s software.
Franck Robichon/AAP Image
The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple’s reputation for security. But you can fix the problem by updating your phone’s software.
Digital attacks can cause havoc in different places all at the same time.
Pushish Images/Shutterstock.com
Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There’s less attention to the dangers of cyberattacks, which could cripple key utilities.
Power grids are high priority targets during conflict.
Shutterstock
US and Russian tension over power grid cyber attacks is a concern for global stability, but it also highlights our own critical infrastructure vulnerabilities.
It’s been reported that names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, passport details and student academic records were accessed.
www.shutterstock.com
Julian Assange’s indictment under the Espionage Act, a sweeping law with heavy penalties for unauthorized receiving or disclosing of classified information, poses a threat to press freedom.
WhatsApp says more than 1 billion use the app.
Shutterstock/XanderS