Ransomware attacks often strike local government computer systems, which poses a challenge for protecting elections.
PRImageFactory/iStock via Getty Images
Richard Forno, University of Maryland, Baltimore County
A ransomware attack on election-related government computers in a Georgia county raises the specter of more disruptions for Election Day voting and vote tabulation.
If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs.
Shutterstock
The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures…
If Australia’s electricity grid was targeted by cyber attack the fall out could be severe.
Shutterstock
Austraia’s first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
As cryptocurrency systems improve, they will better protect criminals’ identities and even allow people to offer anonymous rewards for crimes they want committed.
More cryptocurrencies appear all the time.
Wit Olszewski/Shutterstock.com
Nir Kshetri, University of North Carolina – Greensboro
Cybercriminals increasingly depend on e-currencies to profit from their misdeeds. They, and their potential victims, could be driving some of the growth in cryptocurrency markets.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
When is it okay for the government to keep a secret?
sharpshutter via shutterstock.com
Nir Kshetri, University of North Carolina – Greensboro
What’s the best way for spy agencies to protect the public: secretly exploit software flaws to gather intelligence, or warn the world and avert malicious cyberattacks?
Small businesses are the forgotten casualties of the recent WannaCry ransomware attack.
The market for exploiting software vulnerabilities can be traced back to the 90s where “phreaking” - modifying telecommunications technology - was popular.
Jennifer/Flickr
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
People don’t want to be interrupted to update their software.
irin73bal via Shutterstock.com
People don’t want to endure the interruptions and inconveniences of keeping their computer software up to date. Research tells us why, and how we might fix the problem – and protect ourselves.
The “WannaCrypt” malware has disrupted vital infrastructure in countries around the world.
EPA/Ritchie B. Tongo
Professor of Computer Science, Jacobs Technion-Cornell Institute, Cornell Tech, and Co-Director, Initiative for CryptoCurrencies and Contracts (IC3), Cornell University
Associate Director, Initiative For Cryptocurrencies and Contracts (IC3); Assistant Prof. of Electrical Engineering, Technion - Israel Institute of Technology