Banning TikTok: What data privacy risk does the app pose, and what could the Chinese government do with data it collects? And is it even possible to ban an app?
The TikTok social media app has raised concerns about cybersecurity and online safety.
Future Publishing via Getty Images
Nir Kshetri, University of North Carolina – Greensboro
School officials are becoming increasingly wary of TikTok amid concerns that the app poses a risk to student safety and privacy and makes the nation vulnerable to spies.
Cyberattacks demanding ransoms for the release of information are on the rise. To determine if they should pay, businesses need to think about how they would react in such a scenario.
In hackathons, people come together to build more extensive and cohesive datasets.
(Shutterstock)
“Hackathons” can imply breaching security and privacy. To more accurately reflect their creative and constructive intent, they can be referred to instead as “datathons” or “code fests.”
Many organisations abide by a “zero trust” rule wherein absolute trust is placed in nothing, apart from a central identity and access management system. But what happens when this system is breached?
The social media strategies of many parties and candidates aim to bypass mainstream media to speak directly to voters, but they are often not as sophisticated as is assumed.
Members of Congress give Ukrainian President Volodymyr Zelensky a standing ovation during a speech by videoconference on Capitol Hill in Washington, D.C., on March 16, 2022. Ukraine says it is pioneering a new source of financial support: cryptocurrency.
(Sarahbeth Maney/The New York Times via AP)
Cryptocurrency allows Ukraine to get quick financial support, and Russia, to bypass international sanctions and protect some of its economic interests.
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
A woman holds a phone in front of the office of NSO Group, which makes a tool that can see and hear everything a phone is used for.
Jack Guez/AFP via Getty Images
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.
Cybersecurity is a growing global threat.
(Shutterstock)
In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China’s Uyghur minority.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Many still make their passwords too simple.
Shutterstock/Vitalii Vodolazskyi
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.