Wednesday, April 26, 2017

SECURITY

SECURITY
Eric Snowden

With the release of a new film about Edward Snowden, the man who revealed secret documents detailing a massive U.S. government spying program, the debate about his character continues. That includes a renewed effort...
Cybersecurity just got even more difficult. Charis Tsevis/flickr, CC BY-NC-ND

It is looking increasingly likely that computer hackers have in fact successfully attacked what had been the pinnacle of cybersecurity – the U.S. National Security Agency (NSA). A few days ago, reports began emerging...
Cyber attacks

Following the hack of Democratic National Committee emails and reports of a new cyberattack against the Democratic Congressional Campaign Committee, worries abound that foreign nations may be clandestinely involved in the 2016 American presidential...
Cyber security

You are now 20 times more likely to have your money stolen online by a criminal overseas than by a pickpocket or mugger in the street, according to recent figures from the Office for...
Police

With three billion camera-equipped cellphones in circulation, we are awash in visual information. Cameras are lighter, smaller and cheaper than ever and they’re everywhere, making it possible for nearly anyone to watch, create, share...

The internet has become a weapon for terrorists, who use social media and other technologies to organise, recruit and spread propaganda. So is it possible to turn technology around and use it to not...
hacker

Malicious hacking online costs the private and corporate sectors up to $575 billion annually, according to internet security firm McAfee. While security agencies seek out "ethical" hackers to help combat such attacks, little is known...
Smart Home

Smart homes, an aspect of the Internet of Things, offer the promise of improved energy efficiency and control over home security. Integrating various devices together can offer users easy programming of many devices around the...
Ransomware

Ransomware – malicious software that sneaks onto your computer, encrypts your data so you can’t access it and demands payment for unlocking the information – has become an emerging cyberthreat. Several reports in the...
encryption

Encryption technology ensures that your online data stays private and secure as it leaves your hands and travels towards the intended recipient. What began as the humble cipher in Caesar’s time is now the...
Cyberbombs

Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was “dropping cyberbombs,” taking its ongoing battle against the Islamic State group into the online world. Other American officials,...
Cybersecurity

Imagine that a criminal investigator has identified one or more computers that are part of ongoing criminal activity. Unfortunately, the people operating these computers are hiding them. The machines could be anywhere in the...