Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Many still make their passwords too simple.
Shutterstock/Vitalii Vodolazskyi
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
More than 500 million people’s details were compromised. The records include various combinations of name, email, gender, date of birth, location, relationship status and employer.
It’s still too early to say who attacked Channel Nine, disrupting its live broadcasts over the weekend. But fingers have been pointed at Russian state actors using a tactic nicknamed ‘wiperware’.
In many cases, getting on a plane, attending a show or going to a store requires an app that proves you’ve been vaccinated.
AP Photo/Amr Nabil
How do you prove that people have been vaccinated without putting their privacy at risk? The technology and best practices to make it happen exist. It’s far from clear, however, if they’re being used.
Universities are a prime target for cyber attacks and the weakest links in their defences are all the non-expert users of their systems. Teaching everyone basic cyber hygiene is vital.
Nearly five million homes and businesses lost power in Texas on Feb. 15, and millions remained without power throughout the week.
(AP Photo/LM Otero)
The weather-related impacts of climate change will increasingly threaten critical infrastructure in the future. Shifting electricity grids towards microgrids could help.
Ransomware is quietly developing into one of the most disruptive – and lucrative – forms of cybercrime.
Exposure notification systems alert people when they’ve been exposed to the coronavirus but don’t record the information.
AleksandarGeorgiev/E+ via Getty Images
Bluetooth wireless communication makes it possible to track when people have been exposed to people infected with the coronavirus. The right cryptography scheme keeps alerts about exposures private.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Cybersecurity risks evolve rapidly, and are everywhere.
Joshua Gandara/Unsplash
Cybersecurity risks are evolving rapidly. How can they be more effectively assessed and managed ?
The U.S. Justice Department was among many federal agencies and private companies whose networks suffered intrusions from Russian hackers.
AP Photo/Jacquelyn Martin
A scholar of cyber conflict sets out why retaliation doesn’t prevent future attacks, and explains what might have a better chance.
Federal government agencies, from the Treasury Department to the National Nuclear Security Administration, have been compromised by the attack.
Tasos Katopodis/Getty Images
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.