Agriculture is becoming increasingly dependent on technology.
U.S. Department of Agriculture Photo by Lance Cheung
Bringing advanced technologies to the ancient practice of farming could help feed the world’s growing population, but it could also open the door for people looking to disrupt the global food system.
Scam techniques that rely on human nature are increasingly being executed via technology. Here are five that recorded big increases in 2021.
The anonymous nature of cryptocurrency transactions is ideal for con artists.
seksan Mongkhonkhamsao/Moment via Getty Images
From initial coin offerings that are totally fake to fraudsters demanding payments in crypto, scams involving cryptocurrencies are on the rise. Two experts explain why – and how to protect yourself.
Shortly after taking office, President Biden declared that the the U.S. would no longer roll over in the face of Russian cyberattacks.
AP Photo/Evan Vucci
The US has made a dent in Russian cyber criminal gangs. But tensions with Russia and the shadowy nature of hacking keep the threat level high.
A vulnerability in Log4j, a humble but widespread piece of software, has put millions of computers at risk.
SOPA Images/LightRocket via Getty Images
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Our critical infrastructures are growing increasingly complex as the number of devices and connections in these systems continues to grow.
An increasing number of cyberattacks threaten critical infrastructures. These attacks exploit weaknesses in outdated and insecure systems.
Vulnerable devices and systems are targets.
As schools and colleges confront the challenges of COVID-19, cybercriminals exploit weaknesses in the computer networks and online systems.
Novikov Aleksey via Shutterstock
Hybrid warfare is becoming increasingly sophisticated. Governments and vulnerable organisations need to adapt quickly to respond to the threat.
With little international law governing state-sponsored cybercrime, the risk of retaliation and even war is growing.
Cybersecurity is a growing global threat.
A UN working group on cybersecurity is making incremental progress in highlighting the importance of including and protecting civilians.
The first ransomware attack, in 1988, was a crude effort involving virus-laden floppy disks. But in the decades since, the sophistication of malware, and the money reaped by criminals, has skyrocketed.
The recent attack on software supplier Kaseya has been labelled as the biggest global ransomware attack on record.
Cyberwarfare will require new defensive measures by government and corporations.
Co-ordinated cyberattacks can create massive disruptions to infrastructure and supply chains. New treaties are needed to prevent cyberwarfare, but it’s challenging to predict technological advances.
Credit bureau Equifax announced in 2017 that the personal information of 143 million Americans – about three-quarters of all adults – had been exposed in a major data breach.
AP Photo/Mike Stewart
If an organization that has your data gets hacked, your vulnerability depends on the kind of attack and the kind of data. Here’s how you can assess your risk and what to do to protect yourself.
Ransomware has gone professional, with criminal consultants, affiliates and brokers – arresting them all will be difficult.
Colonial Pipeline storage tanks. On May 7, 2021, the company experienced a ransomware cyberattack.
(AP Photo/Seth Wenig)
The amount of online data and transactions are growing exponentially. Related is the increasing possibility of cyberattacks — one way to address these is by regulating parts of the internet.
The centralisation of internet infrastructure leaves swathes of the online world vulnerable to sudden outages.
Maksim Shmeljov / Shutterstock
Cybersecurity for pipelines and ports is too important to leave unregulated.
What would happen if companies stopped paying ransoms?
Liu Jie/Xinhua via Getty Images
The FBI and Treasury Department frown on the idea of paying off cyber attackers. But there is sufficient ethical and legal gray areas to make it a real moral quandary for business leaders.
For cybersecurity, your best bet is to assume that the enemy has already slipped inside.
clu/DigitalVision Vectors via Getty Images
Most people think of trust as active – you place your trust in someone or you don’t. But weak cybersecurity, like leaving your front door unlocked, is a matter of trust, too.