One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
Cyberattacks can be devastating, just not on the battlefield, according to researchers who looked at 10 years of armed conflicts around the world.
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
Artificial intelligence is emerging as a key cybersecurity tool for both attackers and defenders.
Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
The US has made a dent in Russian cyber criminal gangs. But tensions with Russia and the shadowy nature of hacking keep the threat level high.
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Keeping biomedical data private is important, but so is sharing it for research. Game theory can help researchers accomplish both.
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
Ransomware has gone professional, with criminal consultants, affiliates and brokers – arresting them all will be difficult.
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
A thriving black market for stolen personal data makes millions of people vulnerable to spies, spammers, scammers and hackers.
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
It’s possible that hackers could have infiltrated and spied on Boris Johnson’s personal phone from as early as 2006.
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Cyber attacks have created new dilemmas for philosophers who determine the ethics of war.
Commercial software is vital to all of our cybersecurity. What should governments do if they find it has weaknesses?
Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.