What is Volt Typhoon? A cybersecurity expert explains the Chinese hackers targeting US critical infrastructure

Chinese state-sponsored hackers are targeting critical infrastructure. Here’s what they’re doing, how the US government is responding and how you can help.

Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County • conversation
March 29, 2024 ~6 min

Cybersecurity for satellites is a growing challenge, as threats to space-based infrastructure grow

The capability for attacking satellites in space using cyber technology is advancing fast

Sylvester Kaczmarek, Chief Technology Officer, Imperial College London • conversation
Feb. 20, 2024 ~8 min


Cybercrime victims who aren’t proficient in English are undercounted – and poorly protected

The federal government’s web portal for reporting cybercrimes is of little use if you have limited proficiency with English.

Fawn Ngo, Associate Professor of Criminology, University of South Florida • conversation
Jan. 29, 2024 ~7 min

The top risks from technology that we’ll be facing by the year 2040

A new study consulted futurists for their predictions about technological evolution.

Charles Weir, Research Fellow and Lecturer, Lancaster University • conversation
Jan. 23, 2024 ~7 min

The vast majority of us have no idea what the padlock icon on our internet browser is – and it's putting us at risk

The padlock symbol simply means that the data being sent between the web server and the user’s computer is encrypted and cannot be read by others. But many people don’t know that.

Fiona Carroll, Reader in Human Computer Interaction, Cardiff Metropolitan University • conversation
Nov. 22, 2023 ~6 min

Spyware can infect your phone or computer via the ads you see online – report

You probably won’t be targeted by spyware, but if you are, odds are you won’t know about it. The latest spyware slips in unseen through online ads as you go about your digital life.

Claire Seungeun Lee, Associate Professor of Criminology and Justice Studies, UMass Lowell • conversation
Sept. 22, 2023 ~7 min

Car thieves are using increasingly sophisticated methods, and most new vehicles are vulnerable

The new techniques go far beyond hacking your car’s key fob system.

Omair Uthmani, Lecturer in Networking and Security, Glasgow Caledonian University • conversation
June 2, 2023 ~6 min

Lessons from 'Star Trek: Picard' – a cybersecurity expert explains how a sci-fi series illuminates today's threats

‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.

Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County • conversation
May 12, 2023 ~9 min


Online predators target children’s webcams, study finds

Sexual predators have found a new way to exploit children: taking control of their webcams to record them without their consent. Here’s how the attack works and how you can protect your kids.

Christian Jordan Howell, Assistant Professor in Cybercrime, University of South Florida • conversation
May 2, 2023 ~9 min

What is the National Cybersecurity Strategy? A cybersecurity expert explains what it is and what the Biden administration has changed

The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.

Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County • conversation
March 20, 2023 ~9 min

/

7