Co-ordinated cyberattacks can create massive disruptions to infrastructure and supply chains. New treaties are needed to prevent cyberwarfare, but it’s challenging to predict technological advances.
If an organization that has your data gets hacked, your vulnerability depends on the kind of attack and the kind of data. Here’s how you can assess your risk and what to do to protect yourself.
The amount of online data and transactions are growing exponentially. Related is the increasing possibility of cyberattacks — one way to address these is by regulating parts of the internet.
The FBI and Treasury Department frown on the idea of paying off cyber attackers. But there is sufficient ethical and legal gray areas to make it a real moral quandary for business leaders.
Most people think of trust as active – you place your trust in someone or you don’t. But weak cybersecurity, like leaving your front door unlocked, is a matter of trust, too.
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
It’s still too early to say who attacked Channel Nine, disrupting its live broadcasts over the weekend. But fingers have been pointed at Russian state actors using a tactic nicknamed ‘wiperware’.
Richard Forno, University of Maryland, Baltimore County
A ransomware attack on election-related government computers in a Georgia county raises the specter of more disruptions for Election Day voting and vote tabulation.
Nir Kshetri, University of North Carolina – Greensboro
As colleges and universities strive to protect their campuses from COVID-19, they must also pay attention to cyberattacks that target sensitive data, a cybersecurity expert warns.
Much of the world is moving online in response to the coronavirus pandemic. Society’s newly increased dependence on the internet is bringing the need for good cyber policy into sharp relief.