Russia could unleash disruptive cyberattacks against the US – but efforts to sow confusion and division are more likely

Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.

Justin Pelletier, Professor of Practice of Computing Security, Rochester Institute of Technology • conversation
Jan. 26, 2022 ~9 min

How the Biden administration is making gains in an uphill battle against Russian hackers

The US has made a dent in Russian cyber criminal gangs. But tensions with Russia and the shadowy nature of hacking keep the threat level high.

Scott Jasper, Senior Lecturer in National Security Affairs, Naval Postgraduate School • conversation
Jan. 21, 2022 ~9 min


Stop blaming people for choosing bad passwords – it's time websites did more to help

It’s time to think differently about how we address the password problem.

Steven Furnell, Professor of Cyber Security, University of Nottingham • conversation
Jan. 3, 2022 ~6 min

What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what's at stake

Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.

Santiago Torres-Arias, Assistant Professor of Electrical and Computer Engineering, Purdue University • conversation
Dec. 22, 2021 ~9 min

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

Keeping biomedical data private is important, but so is sharing it for research. Game theory can help researchers accomplish both.

Yevgeniy Vorobeychik, Associate Professor of Computer Science, Washington University in St Louis • conversation
Dec. 16, 2021 ~6 min

How vulnerable is your personal information? 4 essential reads

Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.

Eric Smalley, Science + Technology Editor • conversation
Nov. 29, 2021 ~7 min

You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks

Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.

Rick Wash, Associate Professor of Information Science and Cybersecurity, Michigan State University • conversation
Nov. 1, 2021 ~6 min

What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in

A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.

Bhanukiran Gurijala, Assistant Professor of Computer Science & Information Systems, West Virginia University • conversation
Aug. 9, 2021 ~7 min


Fight for control threatens to destabilize and fragment the internet

The US is wrestling with the rest of the world for control of the internet. The ‘net as we know it could be a victim of the struggle.

Nick Merrill, Research Fellow, University of California, Berkeley • conversation
July 26, 2021 ~8 min

A decade since 'the year of the hacktivist', online protests look set to return

The hacktivist collective 'Anonymous' has become just that – but the hacktivism they espoused may be set to return.

Vasileios Karagiannopoulos, Reader in Cybercrime and Cybersecurity, University of Portsmouth • conversation
June 29, 2021 ~9 min

/

7