Thursday, May 25, 2017

SECURITY

SECURITY

A luxury vehicle today contains multiple computers. During an hour's drive, it thus produces multiple gigabytes of data. Even less expensive vehicles are now brimming with information technology. The growing interconnection of the individual...
online passwords

Reusing similar passwords across many online accounts may make you more vulnerable to cyber criminals’ guessing than people realize – new research reveals. Results from research conducted by security experts in the UK and China...
wikileaks

Paul Webster Hare, Boston University The U.S. election has given WikiLeaks an opportunity to revive its image as a world leader in “transparency” leaks. For several years, its leader, Julian Assange, seemed a forlorn and frustrated...
University of Washington

Sending a password or secret code over airborne radio waves like WiFi or Bluetooth means anyone can eavesdrop, making those transmissions vulnerable to hackers who can attempt to break the encrypted code. Now, University of...
Eric Snowden

With the release of a new film about Edward Snowden, the man who revealed secret documents detailing a massive U.S. government spying program, the debate about his character continues. That includes a renewed effort...
Cybersecurity just got even more difficult. Charis Tsevis/flickr, CC BY-NC-ND

It is looking increasingly likely that computer hackers have in fact successfully attacked what had been the pinnacle of cybersecurity – the U.S. National Security Agency (NSA). A few days ago, reports began emerging...
Cyber attacks

Following the hack of Democratic National Committee emails and reports of a new cyberattack against the Democratic Congressional Campaign Committee, worries abound that foreign nations may be clandestinely involved in the 2016 American presidential...
Cyber security

You are now 20 times more likely to have your money stolen online by a criminal overseas than by a pickpocket or mugger in the street, according to recent figures from the Office for...
Police

With three billion camera-equipped cellphones in circulation, we are awash in visual information. Cameras are lighter, smaller and cheaper than ever and they’re everywhere, making it possible for nearly anyone to watch, create, share...

The internet has become a weapon for terrorists, who use social media and other technologies to organise, recruit and spread propaganda. So is it possible to turn technology around and use it to not...
hacker

Malicious hacking online costs the private and corporate sectors up to $575 billion annually, according to internet security firm McAfee. While security agencies seek out "ethical" hackers to help combat such attacks, little is known...
Smart Home

Smart homes, an aspect of the Internet of Things, offer the promise of improved energy efficiency and control over home security. Integrating various devices together can offer users easy programming of many devices around the...