Boris Johnson's phone: what can hackers do with your mobile number?

It's possible that hackers could have infiltrated and spied on Boris Johnson's personal phone from as early as 2006.

Edward Apeh, Principal Academic in Computing, Bournemouth University • conversation
April 30, 2021 ~5 min

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.

Scott Shackelford, Associate Professor of Business Law and Ethics; Executive Director, Ostrom Workshop; Cybersecurity Program Chair, IU-Bloomington, Indiana University • conversation
April 26, 2021 ~9 min


Ransomware gangs are running riot – paying them off doesn't help

Ransomware is quietly developing into one of the most disruptive – and lucrative – forms of cybercrime.

Jan Lemnitzer, Lecturer, Department of Digitalization, Copenhagen Business School • conversation
Feb. 17, 2021 ~9 min

The SolarWinds hack was all but inevitable – why national cyber defense is a 'wicked' problem and what can be done about it

Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.

Terry Thompson, Adjunct Instructor in Cybersecurity, Johns Hopkins University • conversation
Feb. 9, 2021 ~10 min

North Korea targeted cybersecurity researchers using a blend of hacking and espionage

Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.

Paulo Shakarian, Associate Professor of Computer Science, Arizona State University • conversation
Feb. 4, 2021 ~7 min

The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expert

Cyberwarfare is more like cancer than bombs and bullets. Cybersecurity experts are just beginning to make their diagnosis of the Sunburst hack.

Paulo Shakarian, Associate Professor of Computer Science, Arizona State University • conversation
Dec. 29, 2020 ~9 min

Your robot vacuum could spy on you

Dust and dirt aren't the only things your robot vacuum can pick up. New research shows how hackers could use them to listen to private conversations, too.

National University of Singapore • futurity
Dec. 7, 2020 ~6 min

Honour among thieves: the study of a cybercrime marketplace in action

Researchers at the Cambridge Cybercrime Centre have revealed what they’ve learned from analysing hundreds of thousands of illicit trades that took place in an

Cambridge University News • cambridge
Nov. 6, 2020 ~8 min


Defending the 2020 election against hacking: 5 questions answered

Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here's the state of election cybersecurity.

Douglas W. Jones, Associate Professor of Computer Science, University of Iowa • conversation
Sept. 14, 2020 ~7 min

Twitter hack exposes broader threat to democracy and society

Hackers demonstrated they can take over Twitter's technology infrastructure, a brazen move that hints at how such an attack could destabilize society.

Laura DeNardis, Professor and Interim Dean, American University School of Communication • conversation
July 17, 2020 ~8 min

/

5