Sweden is studying the possibility of an “e-krona”, an electronic form of the country’s currency.
Shutterstock
With countries such as China and Sweden are studying plans to create a new form of money – a central-bank digital currency. CBDCs risk revolutionizing both the way money is created and distributed.
Recounting very close races is not enough to ensure election integrity.
AP Photo/Ben Finley
The best way to protect elections is to plan and prepare for an audit of the results after the votes are cast.
The US has charged and sanctioned nine Iranians and an Iranian company for cyber attacks.
Parmida Rahimi/Flickr
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
Will Oliver/EPA-EFE
Theresa May says Britain could unleash ‘extensive measures’ against Russia following the nerve agent poisoning of ex-spy Sergei Skripal.
How secure is your password?
Avi Richards/Unsplash
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
What’s the best way to secure a world of connected objects?
Wilgengebroed
More connected devices means more vulnerability to cyberattacks. Is there a cheap, easy and secure way to protect the internet and the world?
Servers hosting your favorite websites may be subject to denial-of-service attacks.
Visualhunt
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
A smartphone is a digital form of ID for many apps and services.
Iowa Department of Transportation
Smartphones are key elements of two-factor authentication processes. Weakening their security threatens people’s digital identities.
Detailed digital forensics could help make everyone safer online.
Rawpixel.com/Shutterstock.com
An ultra-safe industry has important experience that could help a vulnerable new industry improve its safety.
Money is a crucial target for North Korea’s hacking efforts.
rega rega/Shutterstock.com
North Korea’s cyber army is closely controlled by the ruling regime – a key difference from other countries’ cyberattack and espionage groups.
Does every person’s vote count?
AntonSokolov/Shutterstock.com
Researchers reveal the ways the US election system is under threat – only one of which has anything to do with Russia.
Shutterstock
Cyberattacks are in the top five global risks, behind extreme weather events and natural disasters. But global cooperation remains deeply problematic.
Staying safe online requires more than just a good password.
Rawpixel.com/Shutterstock.com
Four important elements to consider when evaluating how safe you are online.
The government’s Defence Export Strategy aims to make Australia a world leader in arms exports.
Shutterstock
The government wants Australia to grow defence exports 800% by 2028. Investing in the cyber industry may be the only way to get there.
Shutterstock
But despite the UK’s alarmist tone on the incoming NIS directive, it’s not just about the hefty £17m fines.
Is this cloud secure?
SWEviL/Shutterstock.com
Storing data in the cloud is convenient, but how secure is it? And what are users’ options for stepping up their data security?
A call to better track manufacturing, shipping and distribution.
Travel mania/Shutterstock.com
Flaws in manufacturing processes can cause chip flaws like Spectre and Meltdown – and blockchain technology may offer a solution.
Shutterstock
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Brett Johnson tears up when he mentions the FBI special agent who helped him quit online fraud.
Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.
Cyber attacks have the potential to cause economic disruption, coerce changes in political behaviour and subvert systems of governance.
from www.shutterstock.com
Cyber security has dominated international affairs in 2017, with the US election hack as one of the main stories. The ongoing investigation shows that cyber attacks can subvert systems of governance.