You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
Rick Wash, Associate Professor of Information Science and Cybersecurity, Michigan State University •
conversation
Nov. 1, 2021 • ~6 min
Nov. 1, 2021 • ~6 min
What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
Bhanukiran Gurijala, Assistant Professor of Computer Science & Information Systems, West Virginia University •
conversation
Aug. 9, 2021 • ~7 min
Aug. 9, 2021 • ~7 min
A Chinese hacking competition may have given Beijing new ways to spy on the Uyghurs
In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China's Uyghur minority.
Elochukwu Ukwandu, Lecturer in Computer Security, Department of Computer Science, Cardiff Metropolitan University •
conversation
May 21, 2021 • ~6 min
May 21, 2021 • ~6 min
The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a 'wicked' problem
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Terry Thompson, Adjunct Instructor in Cybersecurity, Johns Hopkins University •
conversation
May 10, 2021 • ~13 min
May 10, 2021 • ~13 min
Four ways to make sure your passwords are safe and easy to remember
Passwords have been around for decades and we’re still getting it wrong.
Steven Furnell, Professor of Cyber Security, University of Nottingham
• conversation
May 5, 2021 • ~6 min
May 5, 2021 • ~6 min
/
5