Wading into culture of computer hackers

Anthropology Professor Gabriella Coleman studies the rich, deep world of hackers.

Jill Radsken • harvard
Feb. 23, 2022 ~11 min

Wordle has been hacked – but that's not going to ruin the fun

This deceptively simple online word guessing game has captured the English-speaking world.

John Dixon, Lecturer, Computer Science, University of Hull • conversation
Jan. 26, 2022 ~8 min


Yes, Wordle has been hacked – but that's not going to ruin the fun

This deceptively simple online word guessing game has captured the English-speaking world.

John Dixon, Lecturer, Computer Science, University of Hull • conversation
Jan. 26, 2022 ~8 min

You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks

Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.

Rick Wash, Associate Professor of Information Science and Cybersecurity, Michigan State University • conversation
Nov. 1, 2021 ~6 min

What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in

A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.

Bhanukiran Gurijala, Assistant Professor of Computer Science & Information Systems, West Virginia University • conversation
Aug. 9, 2021 ~7 min

People don’t realize they’re data breach victims

People who participated in a recent study weren't aware of 74% of the data breaches that affected them. Here are tips if this applies to you, too.

Laurel Thomas-Michigan • futurity
June 23, 2021 ~9 min

It's far too easy for abusers to exploit smart toys and trackers

We believe fitness trackers keep us healthy, and connected toys keep children safe – but such devices are easily abused.

Madeline Carr, Professor of Global Politics and Cybersecurity, UCL • conversation
June 4, 2021 ~8 min

A Chinese hacking competition may have given Beijing new ways to spy on the Uyghurs

In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China's Uyghur minority.

Elochukwu Ukwandu, Lecturer in Computer Security, Department of Computer Science, Cardiff Metropolitan University • conversation
May 21, 2021 ~6 min


The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a 'wicked' problem

Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.

Terry Thompson, Adjunct Instructor in Cybersecurity, Johns Hopkins University • conversation
May 10, 2021 ~13 min

Four ways to make sure your passwords are safe and easy to remember

Passwords have been around for decades and we’re still getting it wrong.

Steven Furnell, Professor of Cyber Security, University of Nottingham • conversation
May 5, 2021 ~6 min

/

5