If you’re reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who ‘do the wrong thing’ is unlikely to help.
How can we keep our personal data safe?
Jim Kaskade/Flickr
Companies today collect vast amounts of our personal data. What measures can governments and regulators take to reduce the inherent risks and keep our data?
Ransomware is quietly developing into one of the most disruptive – and lucrative – forms of cybercrime.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Cybersecurity risks evolve rapidly, and are everywhere.
Joshua Gandara/Unsplash
Cybersecurity risks are evolving rapidly. How can they be more effectively assessed and managed ?
The U.S. Justice Department was among many federal agencies and private companies whose networks suffered intrusions from Russian hackers.
AP Photo/Jacquelyn Martin
A scholar of cyber conflict sets out why retaliation doesn’t prevent future attacks, and explains what might have a better chance.
Federal government agencies, from the Treasury Department to the National Nuclear Security Administration, have been compromised by the attack.
Tasos Katopodis/Getty Images
Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here’s the state of election cybersecurity.
Universities hold valuable information but are large and porous communities, with legacy IT systems often adding to the risks. But following a few basic rules can help counter cyber attacks.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
Vulnerable websites are popping up as organizations move online during the coronavirus pandemic – and hackers have more time at home alone. The result is more websites falling victim to defacement.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard.
U.S. Air Force photo by J.M. Eddins Jr.
Benjamin Jensen, American University School of International Service and Chris Inglis, United States Naval Academy
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it’s time to change that.
The proliferation of smart devices including healthcare devices means the health system is vulnerable to cyber attacks.
The Conversation US | Motion Array
The coronavirus pandemic lays bare the many vulnerabilities created by society’s dependence on the internet. Watch the video to learn more about these issues.
Amazon says it has considered adding facial recognition technology to its Ring doorbell cameras. Some politicians are concerned Ring’s video-sharing partnerships with police departments encroach on people’s privacy and civil liberties.
THE ASSOCIATED PRESS/Jessica Hill
Amazon says it’s the “new neighbourhood watch” but Ring may just be another technology that gives police too much data and lets neighbourhoods double down on their biases.