Menú Close

Artículos sobre Hackers

Mostrando 1 - 20 de 104 artículos

As missiles rain down on Ukraine’s telecommunications infrastructure, including Kyiv’s TV tower, hackers have been attacking in cyberspace. Sergei Supinsky/AFP via Getty Images

How Ukraine has defended itself against cyberattacks – lessons for the US

Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine. Russian Defense Ministry Press Service via AP

Cyberattacks have yet to play a significant role in Russia’s battlefield operations in Ukraine – cyberwarfare experts explain the likely reasons

Cyberattacks can be devastating, just not on the battlefield, according to researchers who looked at 10 years of armed conflicts around the world.
Defending against cyberattacks increasingly means looking for patterns in large amounts of data – a task AI was made for. Yuichiro Chino/Moment via Getty Images

How AI is shaping the cybersecurity arms race

Artificial intelligence is emerging as a key cybersecurity tool for both attackers and defenders.
The Department of Justice indicted six officers of Russia’s GRU military intelligence service in October 2020 on charges of hacking and deploying malware. Andrew Harnik - Pool/Getty Images

Russia could unleash disruptive cyberattacks against the US – but efforts to sow confusion and division are more likely

Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
A vulnerability in Log4j, a humble but widespread piece of software, has put millions of computers at risk. SOPA Images/LightRocket via Getty Images

What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what’s at stake

Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Biomedical research relies on large amounts of genomic data, which has to be protected from revealing people’s identities. AP Photo/Jerome Delay

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

Keeping biomedical data private is important, but so is sharing it for research. Game theory can help researchers accomplish both.
Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off. WhataWin/iStock via Getty Images

How vulnerable is your personal information? 4 essential reads

Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it. Alan de la Cruz via Unsplash

Shape-shifting computer chip thwarts an army of hackers

Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense. Fort George G. Meade Public Affairs Office/Flickr

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem

Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.

Principales colaboradores

Más