Menu Close

Articles on Hackers

Displaying 1 - 20 of 94 articles

The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it. Alan de la Cruz via Unsplash

Shape-shifting computer chip thwarts an army of hackers

Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense. Fort George G. Meade Public Affairs Office/Flickr

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem

Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense. Fort George G. Meade Public Affairs Office/Flickr

The SolarWinds hack was all but inevitable – why national cyber defense is a ‘wicked’ problem and what can be done about it

Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.
Shutterstock

Can I still be hacked with 2FA enabled?

Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they're not all equally protective.

Top contributors

More