The world shook at the news in early January that a US drone strike had killed Iran’s top military general, Qassem Soleimani, outside Baghdad’s airport. According to the Pentagon, the attack was…
The world shook at the news in early January that a US drone strike had killed Iran’s top military general, Qassem Soleimani, outside Baghdad’s airport. According to the Pentagon, the attack was…
Iran and other nations have waged a stealth cyberwar against the United States for at least the past decade, largely targeting not the government itself but, rather, critical infrastructure companies. This threat…
While individuals with access to critical infrastructure systems of any type should be vigilant in the coming weeks – most Americans are at no substantially greater risk of cyberattack related to on-going…
The spread of hate speech via social media could be tackled using the same “quarantine” approach deployed to combat malicious software, according to University of Cambridge researchers. Definitions of hate speech vary…
Email users should have far more control over the transmission of their messages upon death, a new study suggests. Currently, Google and Microsoft, the main email providers, have contractual provisions in place…
The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself. New research from Michigan State University (MSU)…
From smartphone games and personal email accounts to international banking and hospital records, software is everywhere. It entertains, boosts efficiency, and even saves lives. Unfortunately, for every new program developed, there is…
Organisations aren’t moving quickly enough on cyber security threats linked to the drive toward using personal mobile devices in the workplace, warns a QUT privacy researcher. Dr. Kenan Degirmenci from QUT’s Science…
Differences in cultural values have led some countries to tackle the spectre of cyber-attacks with increased internet regulation, whilst others have taken a ‘hands-off’ approach to online security – a new study…