Saturday, April 29, 2017

SECURITY

SECURITY

Jessica Su, Stanford University As you browse the internet, online advertisers track nearly every site you visit, amassing a trove of information on your habits and preferences. When you visit a news site, they might...

Sri Sridharan, University of South Florida Our increasingly connected and digital world is vulnerable to attack and needs more skilled professionals who know how to defend it. As connected devices proliferate, particularly smart devices creating...

Frederic Lemieux, Georgetown University President Trump has gotten off to a rough start with the intelligence community. The day after being sworn in, Trump spoke at CIA headquarters in an apparent attempt to mend his relationship...
cyber fatigue

Richard Forno, University of Maryland, Baltimore County As a new presidential administration takes over, it will need to pay significant attention to cybersecurity. Indeed, we’ve already been told to expect “a comprehensive plan” for cybersecurity...

It’s not often that any one of us needs to dial 911, but we know how important it is for it to work when one needs it. It is critical that 911 services always...

Larry Hardesty | MIT News Office Press Inquiries Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most popular of these networks —...

Cyberattackers pose many threats to a wide range of targets. Russia, for example, was accused of hacking Democratic Party computers throughout the year, interfering with the U.S. presidential election. Then there was the unknown...

Cybersecurity concerns crop up everywhere you turn lately – around the election, email services, retailers. And academic institutions haven’t been immune to security breaches either. According to a recent report by VMware, almost all...

A luxury vehicle today contains multiple computers. During an hour's drive, it thus produces multiple gigabytes of data. Even less expensive vehicles are now brimming with information technology. The growing interconnection of the individual...
online passwords

Reusing similar passwords across many online accounts may make you more vulnerable to cyber criminals’ guessing than people realize – new research reveals. Results from research conducted by security experts in the UK and China...
wikileaks

Paul Webster Hare, Boston University The U.S. election has given WikiLeaks an opportunity to revive its image as a world leader in “transparency” leaks. For several years, its leader, Julian Assange, seemed a forlorn and frustrated...
University of Washington

Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the encrypted code. Now, University of...