Nir Kshetri, University of North Carolina – Greensboro
School officials are becoming increasingly wary of TikTok amid concerns that the app poses a risk to student safety and privacy and makes the nation vulnerable to spies.
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
It’s still too early to say who attacked Channel Nine, disrupting its live broadcasts over the weekend. But fingers have been pointed at Russian state actors using a tactic nicknamed ‘wiperware’.
Richard Forno, University of Maryland, Baltimore County
A ransomware attack on election-related government computers in a Georgia county raises the specter of more disruptions for Election Day voting and vote tabulation.
Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here’s the state of election cybersecurity.
The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple’s reputation for security. But you can fix the problem by updating your phone’s software.
The idea of CRISPR as scissors ignores an entire ecosystem of moving parts that are crucial for understanding the awe-inspiring, crazy thing scientists are trying to do when they attempt gene editing.
Richard Forno, University of Maryland, Baltimore County
Ransomware has crippled governments and companies around the world, encrypting data and demanding payment for the decryption key – though that’s no guarantee of recovering the information.
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here’s what could happen if you do – and how you can minimise your risk.
Before you download antivirus and ad-blocker apps, do your due diligence on what personal information they want to access. Here are some tips on what to look out for.
Enterprising cryptocurrency enthusiasts have found a way to use your computer processor and electricity to make themselves money. What is cryptojacking, and how does it work?