A laptop is one of car thieves’ go-to tools.
Lorado/iStock via Getty Images
Thieves are trading their pry bars for laptops and wireless devices to steal cars that nowadays rely on remotes and computer networks.
The Five Eyes alliance is critical to hunting and detecting foreign cyber actors, but tends to work in secret.
This orbiting museum in the show ‘Star Trek: Picard’ plays a key role in fending off a futuristic form of cyberattack.
‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.
The federal government has a lot of cybersecurity resources, but the private sector plays a key role in national cyber defense.
The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.
Hackers are just one part of a supply chain in a multimillion-dollar black market for stolen data.
Peach_iStock via Getty Images
The hacker who steals your data is just one part of an illicit supply chain featuring producers, wholesalers, distributors and consumers – a black-market industry worth millions of dollars.
Peiter “Mudge” Zatko was Twitter’s security chief. What he claims he found there is a security nightmare.
Photo by Matt McClain/The Washington Post via Getty Images
Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.
Your digital footprints can give hackers clues about you that they can use to trick you.
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
As missiles rain down on Ukraine’s telecommunications infrastructure, including Kyiv’s TV tower, hackers have been attacking in cyberspace.
Sergei Supinsky/AFP via Getty Images
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine.
Russian Defense Ministry Press Service via AP
Cyberattacks can be devastating, just not on the battlefield, according to researchers who looked at 10 years of armed conflicts around the world.
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
Defending against cyberattacks increasingly means looking for patterns in large amounts of data – a task AI was made for.
Yuichiro Chino/Moment via Getty Images
Artificial intelligence is emerging as a key cybersecurity tool for both attackers and defenders.
The Department of Justice indicted six officers of Russia’s GRU military intelligence service in October 2020 on charges of hacking and deploying malware.
Andrew Harnik - Pool/Getty Images
Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
Shortly after taking office, President Biden declared that the the U.S. would no longer roll over in the face of Russian cyberattacks.
AP Photo/Evan Vucci
The US has made a dent in Russian cyber criminal gangs. But tensions with Russia and the shadowy nature of hacking keep the threat level high.
A vulnerability in Log4j, a humble but widespread piece of software, has put millions of computers at risk.
SOPA Images/LightRocket via Getty Images
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
Biomedical research relies on large amounts of genomic data, which has to be protected from revealing people’s identities.
AP Photo/Jerome Delay
Keeping biomedical data private is important, but so is sharing it for research. Game theory can help researchers accomplish both.
Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off.
WhataWin/iStock via Getty Images
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
Ransomware has gone professional, with criminal consultants, affiliates and brokers – arresting them all will be difficult.
The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it.
Alan de la Cruz via Unsplash
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
The black market for stolen personal information motivates most data breaches.
aleksey-martynyuk/iStock via Getty Images
A thriving black market for stolen personal data makes millions of people vulnerable to spies, spammers, scammers and hackers.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.