There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys.
Shutterstock
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here’s how you can protect yourself.
With so many reports of data breaches, it is easy to tune out to what is happening.
Shutterstock
Data breaches are fact of modern life. It’s likely each of us will have our personal information compromised at some point. Here’s how to reduce the risk and limit the damage if and when it occurs.
Distributed Denial of Service (DDoS) attacks are up 16% in the last year.
Shutterstock
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Google and Facebook reign supreme over digital advertising. Yet the Cambridge Analytica scandal, and when the effectiveness of this advertising seems limited, should we ban this model?
Probes that can transmit electricity inside the skull raise questions about personal autonomy and responsibility.
Hellerhoff
Where does responsibility lie if a person acts under the influence of their brain implant? As neurotechnologies advance, a neuroethicist and a legal expert write that now’s the time to hash it out.
White House counselor Kellyanne Conway.
REUTERS/Joshua Roberts
US law limits public employees’ political activity. But in today’s hyperpartisan political world, it’s getting harder for public employees to navigate between professional neutrality and politics.
It seems near impossible to keep control of our personal data – and Facebook does anything but help.
kalhh/Pixabay
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
Servers hosting your favorite websites may be subject to denial-of-service attacks.
Visualhunt
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.