Deepfakes — manipulated images of people — can be difficult to distinguish from the real thing, and this has terrifying consequences for democracy.
The social media strategies of many parties and candidates aim to bypass mainstream media to speak directly to voters, but they are often not as sophisticated as is assumed.
It’s true that phones aren’t as prone to viruses as computers – but they’re still far from immune.
Cloud services are convenient, but if an organization isn’t careful about how it uses them, the services can also give data thieves an opening.
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
Here’s what happens when you scan one of those ubiquitous two-dimensional black-and-white patterns.
By linking different issues together, organisations show the importance of approaching information disorder as a complex problem requiring various responses.
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
Cyberattacks can be devastating, just not on the battlefield, according to researchers who looked at 10 years of armed conflicts around the world.
The funds are allocated across a ten-year period, with most of the money redirected from defence spending.
With Russia poised to launch cyberattacks on US targets, many local governments find themselves without the staff or resources to even recognize when they’re under attack.
The BBC has resumed broadcasting via shortwave radio to ensure civilians can access the news.
From jamming satellite signals to spreading disinformation, Russia’s military has sophisticated technologies it’s bringing to the battlefield in Ukraine.
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
Russian information warriors have the capacity to damage critical US infrastructure systems.
Russia’s cyberattack capabilities can be applied to US targets, including regular Americans’ homes and businesses.
Artificial intelligence is emerging as a key cybersecurity tool for both attackers and defenders.
Smart devices can make our lives easier. But they also present security risks.
Troop buildups and diplomatic negotiations highlight the threat of a major land war in Europe. In cyberspace, Russia has been attacking Ukrainian infrastructure and government operations for years.
Federal and state governments are turning to a facial recognition company to ensure that people accessing services are who they say they are. The move promises to cut down on fraud, but at what cost?