How illicit markets fueled by data breaches sell your personal information to criminals

Every piece of personal data about you has inherent value. As long as there are customers clamoring for that data, breaches are likely to continue.

Thomas Holt, Professor of Criminal Justice, Michigan State University • conversation
June 5, 2025 ~9 min

Governments continue losing efforts to gain backdoor access to secure communications

The perennial tug-of-war between government interests and individual liberties is playing out in the battle over encrypted messaging. Technology tilts the field toward individuals.

Richard Forno, Teaching Professor of Computer Science and Electrical Engineering, and Assistant Director, UMBC Cybersecurity Institute, University of Maryland, Baltimore County • conversation
May 16, 2025 ~10 min


M&S cyberattacks used a little-known but dangerous technique – and anyone could be vulnerable

Sim-swap fraud is becoming increasingly prevalent.

Hossein Abroshan, Senior Lecturer, School of Computing and Information Science, Anglia Ruskin University • conversation
May 14, 2025 ~6 min

M&S cyberattacks used a little-known but dangerous technique

Sim-swap fraud is becoming increasingly prevalent.

Paul Rincon, Commissioning Editor, Science, Technology and Business • conversation
May 14, 2025 ~6 min

Severance: what the hit show can teach us about cybersecurity and human risk

Severance is a cautionary tale of what happens when we try to eliminate cybersecurity threats without understanding people.

Oli Buckley, Professor in Cyber Security, Loughborough University • conversation
April 22, 2025 ~7 min

Severance: what the hit show can teach us about cyber security and human risk

Severance is a cautionary tale of what happens when we try to eliminate cybersecurity threats without understanding people.

Oli Buckley, Professor in Cyber Security, Loughborough University • conversation
April 22, 2025 ~7 min

New UK system to protect satellites against attack shows how global conflict has spilled into outer space

Space is becoming “increasingly contested”, according to military experts.

Jessie Hamill-Stewart, PhD Researcher, University of Bath • conversation
April 14, 2025 ~7 min

Signal is not the place for top secret communications, but it might be the right choice for you – a cybersecurity expert on what to look for in a secure messaging app

Keeping your chats secure is a good idea, but end-to-end encryption is just the beginning of the list of options to consider when picking a messaging app.

Frederick Scholl, Associate Teaching Professor of Cybersecurity, Quinnipiac University • conversation
March 27, 2025 ~5 min


Is DOGE a cybersecurity threat? A security expert explains the dangers of violating protocols and regulations that protect government computer systems

News reports paint a frightening picture of DOGE staff trampling time-tested – and in many cases legally required – management and security practices.

Richard Forno, Teaching Professor of Computer Science and Electrical Engineering, and Assistant Director, UMBC Cybersecurity Institute, University of Maryland, Baltimore County • conversation
Feb. 6, 2025 ~10 min

Selling fear: Marketing for cybersecurity products often leaves consumers less secure

Ever feel like throwing up your hands and giving up on taking control of your online security? How technology companies market their cybersecurity products might have something to do with that.

Doug Jacobson, Professor of Electrical and Computer Engineering, Iowa State University • conversation
Jan. 2, 2025 ~8 min

/

9