Cyber-attacks against the UK Electoral Commission reveal an ongoing threat to democracy

Securing our voting systems to defend against hacks is vital but challenging.

Joe Burton, Professor of International Security (Security and Protection Science), Lancaster University • conversation
Aug. 15, 2023 ~8 min

Four ways criminals could use AI to target more victims

AI could allow cybercriminals to operate with greater efficiency, targeting more people at once.

Daniel Prince, Professor of Cyber Security, Lancaster University • conversation
June 22, 2023 ~7 min


Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrime

Cybercriminals are attempting to monetise the hacking techniques used by state actors.

Robert Black, Lecturer in Information Activities, Cranfield University • conversation
June 19, 2023 ~7 min

Should the US ban TikTok? Can it? A cybersecurity expert explains the risks the app poses and the challenges to blocking it

Banning TikTok: What data privacy risk does the app pose, and what could the Chinese government do with data it collects? And is it even possible to ban an app?

Doug Jacobson, Professor of Electrical and Computer Engineering, Iowa State University • conversation
March 23, 2023 ~8 min

Wordle has been hacked – but that's not going to ruin the fun

This deceptively simple online word guessing game has captured the English-speaking world.

John Dixon, Lecturer, Computer Science, University of Hull • conversation
Jan. 26, 2022 ~8 min

Yes, Wordle has been hacked – but that's not going to ruin the fun

This deceptively simple online word guessing game has captured the English-speaking world.

John Dixon, Lecturer, Computer Science, University of Hull • conversation
Jan. 26, 2022 ~8 min

You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks

Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.

Rick Wash, Associate Professor of Information Science and Cybersecurity, Michigan State University • conversation
Nov. 1, 2021 ~6 min

What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in

A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.

Bhanukiran Gurijala, Assistant Professor of Computer Science & Information Systems, West Virginia University • conversation
Aug. 9, 2021 ~7 min


It's far too easy for abusers to exploit smart toys and trackers

We believe fitness trackers keep us healthy, and connected toys keep children safe – but such devices are easily abused.

Madeline Carr, Professor of Global Politics and Cybersecurity, UCL • conversation
June 4, 2021 ~8 min

A Chinese hacking competition may have given Beijing new ways to spy on the Uyghurs

In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China's Uyghur minority.

Elochukwu Ukwandu, Lecturer in Computer Security, Department of Computer Science, Cardiff Metropolitan University • conversation
May 21, 2021 ~6 min

/

3