As an ethical hacker, I can’t believe the risks people routinely take when they access the internet in public
If you’re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.
Christopher Patrick Hawkins, Lecturer in Cyber Security and Computer Science, University of Staffordshire
• conversation
Oct. 8, 2024 • ~5 min
Oct. 8, 2024 • ~5 min
Cyber-attacks against the UK Electoral Commission reveal an ongoing threat to democracy
Securing our voting systems to defend against hacks is vital but challenging.
Joe Burton, Professor of International Security (Security and Protection Science), Lancaster University •
conversation
Aug. 15, 2023 • ~8 min
Aug. 15, 2023 • ~8 min
Should the US ban TikTok? Can it? A cybersecurity expert explains the risks the app poses and the challenges to blocking it
Banning TikTok: What data privacy risk does the app pose, and what could the Chinese government do with data it collects? And is it even possible to ban an app?
Doug Jacobson, Professor of Electrical and Computer Engineering, Iowa State University •
conversation
March 23, 2023 • ~8 min
March 23, 2023 • ~8 min
You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
Rick Wash, Associate Professor of Information Science and Cybersecurity, Michigan State University •
conversation
Nov. 1, 2021 • ~6 min
Nov. 1, 2021 • ~6 min
What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
Bhanukiran Gurijala, Assistant Professor of Computer Science & Information Systems, West Virginia University •
conversation
Aug. 9, 2021 • ~7 min
Aug. 9, 2021 • ~7 min
/
3