What is the National Cybersecurity Strategy? A cybersecurity expert explains what it is and what the Biden administration has changed

The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.

Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County • conversation
March 20, 2023 ~9 min

Should you pay for Meta's and Twitter’s verified identity subscriptions? A social media researcher explains how the choice you face affects everyone else

Twitter and Meta are looking to make money from protecting users’ identities. This raises questions about collective security, people understanding what they’re paying for and who remains vulnerable.

Anjana Susarla, Professor of Information Systems, Michigan State University • conversation
March 8, 2023 ~8 min


How to avoid falling victim to an online scam -- research says slow down

Hoax websites are becoming more popular with fraudsters. So it’s more important than ever to protect yourself.

Nicholas J. Kelley, Assistant Professor in Social Psychology, University of Southampton • conversation
Feb. 24, 2023 ~6 min

Six parts of your car that gather data on you

Our vehicles hold a remarkable amount of information, which can be used by digital forensic investigators in the detection of crime.

Rachael Medhurst, Course Leader and Lecturer in Cyber Security NCSA, University of South Wales • conversation
Jan. 31, 2023 ~6 min

Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds

The hacker who steals your data is just one part of an illicit supply chain featuring producers, wholesalers, distributors and consumers – a black-market industry worth millions of dollars.

David Maimon, Professor of Criminal Justice and Criminology, Georgia State University • conversation
Dec. 2, 2022 ~7 min

Did Twitter ignore basic security measures? A cybersecurity expert explains a whistleblower's claims

Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.

Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County • conversation
Sept. 1, 2022 ~8 min

Farmers can save water with wireless technologies, but there are challenges – like transmitting data through mud

The Agricultural Internet of Things is making farming more efficient. An information technology expert describes some of the challenges of working with sensors and antennas underground.

Abdul Salam, Assistant Professor of Computer and Information Technology, Purdue University • conversation
Aug. 11, 2022 ~8 min

Rise of precision agriculture exposes food system to new threats

Bringing advanced technologies to the ancient practice of farming could help feed the world’s growing population, but it could also open the door for people looking to disrupt the global food system.

Austin C. Doctor, Assistant Professor of Political Science, University of Nebraska Omaha • conversation
Aug. 8, 2022 ~7 min


Mismanaged cloud services put user data at risk

Cloud services are convenient, but if an organization isn’t careful about how they use them, the services can also give data thieves an opening.

Eric Pauley, PhD student in Computer Science and Engineering, Penn State • conversation
April 11, 2022 ~5 min

Your digital footprints are more than a privacy risk – they could help hackers infiltrate computer networks

One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.

Ravi Sen, Associate Professor of Information and Operations Management, Texas A&M University • conversation
April 8, 2022 ~5 min

/

7