Tuesday, May 30, 2017

SECURITY

SECURITY

The Next Cyberattack Could Come From Sound Waves Bill Buchanan, Edinburgh Napier University You might think your smartphone or laptop is relatively safe from cyber attacks thanks to anti-virus and encryption software. But your devices...

Jungwoo Ryoo, Pennsylvania State University Hacking The Age Of Hacking Brings A Return To The Physical Key With all the news about Yahoo accounts being hacked and other breaches of digital security, it’s easy to wonder if...

Megan Squire, Elon UniversitySince 2009, U.S. Customs and Border Protection agents have been allowed to search electronic devices carried by citizens or noncitizens as they cross the border into the United States from other...

Richard Forno, University of Maryland, Baltimore County and Anupam Joshi, University of Maryland, Baltimore County This week’s WikiLeaks release of what is apparently a trove of Central Intelligence Agency information related to its computer hacking...

Scott Shackelford, Indiana University Having access to the internet is increasingly considered to be an emerging human right. International organizations and national governments have begun to formally recognize its importance to freedom of speech, expression...

Jessica Su, Stanford University As you browse the internet, online advertisers track nearly every site you visit, amassing a trove of information on your habits and preferences. When you visit a news site, they might...

Sri Sridharan, University of South Florida Our increasingly connected and digital world is vulnerable to attack and needs more skilled professionals who know how to defend it. As connected devices proliferate, particularly smart devices creating...

Frederic Lemieux, Georgetown University President Trump has gotten off to a rough start with the intelligence community. The day after being sworn in, Trump spoke at CIA headquarters in an apparent attempt to mend his relationship...
cyber fatigue

Richard Forno, University of Maryland, Baltimore County As a new presidential administration takes over, it will need to pay significant attention to cybersecurity. Indeed, we’ve already been told to expect “a comprehensive plan” for cybersecurity...

It’s not often that any one of us needs to dial 911, but we know how important it is for it to work when one needs it. It is critical that 911 services always...

Larry Hardesty | MIT News Office Press Inquiries Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most popular of these networks —...

Cyberattackers pose many threats to a wide range of targets. Russia, for example, was accused of hacking Democratic Party computers throughout the year, interfering with the U.S. presidential election. Then there was the unknown...