Richard Forno, University of Maryland, Baltimore County
The modern world depends on critical systems, networks and data repositories that are not as secure as they should be. Breaches will continue until society as a whole makes some big changes.
Scholars have ideas about how to help solve our password problems.
vladwei/Shutterstock.com
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
Using solar power could give the U.S. military some advantages – and more security.
Diane Durden/U.S. Marine Corps
US military bases usually get their electricity from the civilian grid, which is vulnerable to attack and to disaster. Solar-powered microgrids could protect national security, and would save money.
How safe is it to use an iPhone?
Mesk Photography/Shutterstock.com
It's impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It's time to return to plain, text-only email.
Are Australian police doing enough with the data they have?
REUTERS/Phil Noble
Support from overseas law enforcement and tech companies is typically a slow and cumbersome process.
Embedded medical devices will continue to be vulnerable to cybersecurity threats. The pacemaker depicted is not made by Abbott’s.
REUTERS/Fabrizio Bensch
Recent federal changes to password-strength guidelines echo the findings of research we've been doing. It's time to think differently about what makes a password secure.
Hackers will start to get help from robots and artificial intelligence soon.
Jinning Li/Shutterstock.com
As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.
Cars are basically computers on wheels. That means they can be hacked.
Floris Looijesteijn/Flickr
The Russian cyberthreat goes back over three decades, extends into the country's educational systems and criminal worlds, and shows no signs of letting up.
The weak spots are at the ends.
ThamKC/Shutterstock.com
Governments' efforts to weaken communications security undermine and distract from the need to protect the real weak points in our online communications.
Taking a much closer look at what’s going on inside malware.
MuchMania/Shutterstock.com
How do malware analysts examine software that's designed to wreak havoc with computers? By using tools that watch software's inner workings very closely.