Peiter “Mudge” Zatko was Twitter’s security chief. What he claims he found there is a security nightmare.
Photo by Matt McClain/The Washington Post via Getty Images
Richard Forno, University of Maryland, Baltimore County
Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.
The depths of the valleys on a key act like a code that must match the lock.
Robin Smith/The Image Bank via Getty Images
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it.
Alan de la Cruz via Unsplash
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
Women bring a much-needed change in perspective to cybersecurity.
Maskot/Maskot via Getty Images
Nir Kshetri, University of North Carolina – Greensboro
Women are underrepresented in technology fields, but especially so in cybersecurity. It’s not just a matter of fairness. Women are better than men at key aspects of keeping the internet safe.
How confident should voters be that their ballots will be counted accurately?
AP Photo/Wilfredo Lee
Ensuring the integrity of democratic elections from hackers and electronic tampering, and boosting public confidence in democracy, isn’t very difficult, nor expensive.
Can they be confident their votes will count?
4zevar/Shutterstock.com
Russian government agents allegedly penetrated US state and county election databases. Scholars of election security offer insight and recommendations about what to do now.
Servers hosting your favorite websites may be subject to denial-of-service attacks.
Visualhunt
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Does every person’s vote count?
AntonSokolov/Shutterstock.com
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
How do malware analysts examine software that’s designed to wreak havoc with computers? By using tools that watch software’s inner workings very closely.
While voter fraud - despite recent allegations - is rare, how do we ensure the ballots we cast are counted accurately? If so, how? Our experts offer background and insight.
Is a Great British Firewall what UK plc perhaps needs? Or is it asking for trouble?
Andrea Danti/shutterstock.com
Richard Forno, University of Maryland, Baltimore County
With the DNC email leak and Trump calling on Russia to hack Clinton’s emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
An open letter signed by security experts from around the world is calling on governments to protect encryption rather than undermine it in a quixotic attempt to tackle terrorism.