Nir Kshetri, University of North Carolina – Greensboro
The top cyberspy agency couldn’t stay immune from attacks forever. What does it mean for governments, companies and internet users as a whole that the NSA has been hacked?
The evidence the Census servers suffered a DDoS attack is weak. A simpler explanation is that they buckled under load of Australians filling out their Census forms as asked.
Monique Mann, Queensland University of Technology dan Michael Wilson, Queensland University of Technology
As governments look to new ways to step up surveillance, hackers find new ways to subvert it. Is there a way to end this cat and mouse game, described as a crypto-war?
Richard Forno, University of Maryland, Baltimore County dan Anupam Joshi, University of Maryland, Baltimore County
The country’s actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Recent terrorist attacks have heightened concerns about the security of nuclear plants. A former top U.S. nuclear regulator says security is weak at many sites worldwide.
Nir Kshetri, University of North Carolina – Greensboro
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
This week’s hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it’s notoriously difficult to pinpoint the origin of a hack.
When Facebook goes down it’s an irritation. But as the world moves its data and processing to the cloud, the potential for major loss grows ever greater.
No matter how many times people are warned to set strong secure passwords, many don’t. So why do people take the risk? And is there anything else they can do to be more secure online?
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…