From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involving multiple deaths, expert futurists have forecast how rapid technology changes may shape our world by 2040. As the…
From misinformation and invisible cyber attacks, to irresponsible AI that could cause events involving multiple deaths, expert futurists have forecast how rapid technology changes may shape our world by 2040. As the…
UTSA announced a pioneering initiative to reshape its academic landscape with the creation of a new college dedicated to artificial intelligence (AI), cybersecurity, computing, data science and related disciplines. This initiative aligns…
Updating passwords for all users of a company or institution’s internal computer systems is stressful and disruptive to both users and IT professionals. Many studies have looked at user struggles and password…
Computer science researchers have developed a new way to identify security weaknesses that leave people vulnerable to account takeover attacks, where a hacker gains unauthorized access to online accounts. Most mobiles are…
In order to escape the computer security bootloop, Congress can create a new technology safety regulator of last resort—the Bureau of Technology Safety (BoTS). In the 1993 film “Groundhog Day,” a weatherman…
TikTok’s victory in Montana (not to mention its defeat in Texas) paradoxically bodes poorly for TikTok’s ability to challenge a federal ban. On Nov 30, 2023, the U.S. District Court for the…
A pair of recent cyberattacks demonstrate how adversaries are changing their strategies. Editor’s Note: The United States often treats foreign cyberattacks on U.S. infrastructure more as an annoyance than a threat. Such a…
The rudimentary hack suggests a significant impact from new SEC disclosure rules and continued impunity for foreign hackers. Last Friday after market close, Microsoft submitted an 8-K filing to the U.S. Securities and Exchange…
The cybersecurity landscape of 2024 presents an evolving challenge for professionals, particularly in the realm of ransomware. The emerging threats demand not only a strategic realignment in defense mechanisms but also an…