The international community – and the U.S. and China in particular – should give serious thought to what might be North Korea’s cyberattack equivalent of a nuclear weapons test.
Who’s giving you advice?
Advice via shutterstock.com
We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
New standards and regulations are beginning to govern how companies protect customers’ data. Companies ignore this vital issue at their peril, both financially and legally.
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding ‘backdoors’ to encryption algorithms weakens everyone’s security. So what are the police and intelligence agencies to do?
Phishing for information and money.
shutterstock.com
As searches of smartphones and other digital devices at US borders become more common, can research and computer science help protect travelers’ privacy?
Changes to the way some organisations must reveal a data breach on personal information.
Rawpixel com
New legislation will soon require organisations to disclose any data breaches involving your private details. But the legislation still has some gaps in it.
Richard Forno, University of Maryland, Baltimore County and Anupam Joshi, University of Maryland, Baltimore County
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.
WikiLeaks claims the CIA has been involved in intensive hacking operations.
EPA/Dennis Brack
WikiLeaks’ latest release details what it claims is the CIA’s hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Members of French presidential candidate Emmanuel Macron’s team have accused Russia of hacking the campaign.
Robert Pratta/Reuters
Most of today’s computer languages make it hard for programmers to protect users’ privacy and security. The fix is to take those tasks out of human hands entirely.
Digital information should be private and secure.
Digital communications via shutterstock.com
Recent developments at the United Nations and the G-20 suggest that the well-known human rights to privacy and freedom of expression may soon be formally extended to online communications.
Looking deep into computer activities.
Via shutterstock.com
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
The cybersecurity industry needs more trained workers.
Students via shutterstock.com
Governments, academic institutions and private companies are all spending millions of dollars. But the most effective solutions to the cybersecurity labor shortage will not be found individually.