Menu Close

Articles on Cyberattacks

Displaying 101 - 120 of 166 articles

A new report finds concerns about water infrastructure tops the list for Canada’s water providers. (Shutterstock)

Understanding the risks to Canada’s drinking water

World Water Day shines a light on the importance of safe, clean drinking water, but a new report finds Canada’s freshwater systems are under stress.
What’s the best way to secure a world of connected objects? Wilgengebroed

Using blockchain to secure the ‘internet of things’

More connected devices means more vulnerability to cyberattacks. Is there a cheap, easy and secure way to protect the internet and the world?
Money is a crucial target for North Korea’s hacking efforts. rega rega/Shutterstock.com

North Korea’s growing criminal cyberthreat

North Korea’s cyber army is closely controlled by the ruling regime – a key difference from other countries’ cyberattack and espionage groups.
North Korean cheerleaders holding the unified Korea flag during the Summer Universiade 2003 in South Korea. EPA-EFE/YONHAP SOUTH KOREA OUT

Even a truce between the two Koreas might not save the Winter Olympics

A delicate truce between North and South Korea has been reached in the run up to the Winter Olympics. It’s a high profile win for an event which is struggling to remain relevant.
Cyber attacks have the potential to cause economic disruption, coerce changes in political behaviour and subvert systems of governance. from www.shutterstock.com

The US election hack, fake news, data theft: the cyber security lessons from 2017

Cyber security has dominated international affairs in 2017, with the US election hack as one of the main stories. The ongoing investigation shows that cyber attacks can subvert systems of governance.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches. Mark Warner/Flickr

Why we need to improve cloud computing’s security

Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.

Top contributors

More