Beginning this summer, you might need to upload a selfie and a photo ID to a private company, ID.me, if you want to file your taxes online.
Oscar Wong/Moment via Getty Images
Federal and state governments are turning to a facial recognition company to ensure that people accessing services are who they say they are. The move promises to cut down on fraud, but at what cost?
The Department of Justice indicted six officers of Russia’s GRU military intelligence service in October 2020 on charges of hacking and deploying malware.
Andrew Harnik - Pool/Getty Images
Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
Shortly after taking office, President Biden declared that the the U.S. would no longer roll over in the face of Russian cyberattacks.
AP Photo/Evan Vucci
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Biomedical research relies on large amounts of genomic data, which has to be protected from revealing people’s identities.
AP Photo/Jerome Delay
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
The $1 trillion bill was a heavy lift for Speaker Nancy Pelosi (center). Next up: the budget reconciliation bill known as Build Back Better.
Anna Moneymaker/Getty Images
The government uses a process called public procurement. A professor of public policy explains how the process works and how it is increasingly used to achieve social goals.
People protesting Biden’s election participate in “Stop the Steal,” a pro-Trump rally in Madison, Wisc., in November 2020.
(Shutterstock)
The internet has created new threats to national security and population welfare. The Canadian government needs an oversight department to address cybersecurity and educate their citizens.
If your gut says something is off about an email message, stop and investigate.
Jose Luis Pelaez Inc/DigitalVision via Getty Images
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
Our critical infrastructures are growing increasingly complex as the number of devices and connections in these systems continues to grow.
(Shutterstock)
The COVID-19 pandemic has meant an increased dependence on digital technologies. However, this comes with a serious threat to our personal privacy and property.
Vulnerable devices and systems are targets.
EThamPhoto/Getty Images
Switching web service providers and providing almost $40 million from the federal budget means the census 2021 website should be safe from crashing at the crucial time this evening.
A woman holds a phone in front of the office of NSO Group, which makes a tool that can see and hear everything a phone is used for.
Jack Guez/AFP via Getty Images
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
Security experts can provide valuable information on vulnerabilities that could be exploited in cyberattacks.
(Alexandre Debiève/Unsplash)