Richard Forno, University of Maryland, Baltimore County y Anupam Joshi, University of Maryland, Baltimore County
The country’s actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Recent terrorist attacks have heightened concerns about the security of nuclear plants. A former top U.S. nuclear regulator says security is weak at many sites worldwide.
Nir Kshetri, University of North Carolina – Greensboro
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
This week’s hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it’s notoriously difficult to pinpoint the origin of a hack.
When Facebook goes down it’s an irritation. But as the world moves its data and processing to the cloud, the potential for major loss grows ever greater.
No matter how many times people are warned to set strong secure passwords, many don’t. So why do people take the risk? And is there anything else they can do to be more secure online?
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
If you think you’re not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.