
The Bold Plan to Create Cyber 311 Hotlines
UT-Austin will join a growing movement to launch cybersecurity clinics for cities and small businesses that often fall through the cracks.
The Bold Plan to Create Cyber 311 Hotlines Read MoreComputer Security, CyberSecurity or Information Technology Security (IT Security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. CyberSecurity also refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.
UT-Austin will join a growing movement to launch cybersecurity clinics for cities and small businesses that often fall through the cracks.
The Bold Plan to Create Cyber 311 Hotlines Read MoreThe tech industry’s transition to passkeys gets its first massive boost with the launch of the alternative login scheme for Google’s billions of users.
Google Is Rolling Out Password-Killing Tech to All Accounts Read MoreIf you’re worried that one of Apple’s trackers is following you without consent, try these tips.
Are You Being Tracked by an AirTag? Here’s How to Check Read MoreThe free tool from Privacy4Cars provides some insight on whether your vehicle is collecting and sharing location and other types of data.
New Tool Shows if Your Car Might Be Tracking You, Selling Your Data Read MoreFrom USB worms to satellite-based hacking, Russia’s FSB hackers known as Turla have spent 25 years distinguishing themselves as “adversary number one.”
The Underground History of Russia’s Most Ingenious Hacker Group Read MoreHidden code in hundreds of models of Gigabyte motherboards invisibly and insecurely downloads programs—a feature ripe for abuse, researchers say.
Millions of PC Motherboards Were Sold With a Firmware Backdoor Read MoreWhat if cybercriminals could hide pernicious payloads in places where commercial cybersecurity software were unable to detect it? Unfortunately, this approach is both possible and increasingly viable.
Hidden Malware Ratchets Up Cybersecurity Risks Read MoreA real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time.
The Ransomware Hunting Team: A Band of Misfits’ Improbable Crusade to Save the World from Cybercrime Read MoreSecurity is still viewed by much of the computing research community in a narrow technical context, leading to results poorly aligned with motivating real-world needs.
Cybersecurity as Illuminator for the Future of Computing Research Read MoreAustria’s data regulator has found that the use of Google Analytics is a breach of GDPR. In the absence of a new EU-US data deal, other countries may follow.
Europe’s Move Against Google Analytics Is Just the Beginning Read MoreGeneral Data Protection Regulation, or GDPR, have overhauled how businesses process and handle data. Our need-to-know GDPR guide explains what the changes mean for you
What is GDPR? The summary guide to GDPR compliance in the UK Read MoreYou’ll never be able to get a clean slate—but you can significantly downsize your digital footprint.
6 Ways to Delete Yourself From the Internet Read MoreUnderwater cables keep the internet online. When they congregate in one place, things get tricky.
The Most Vulnerable Place on the Internet Read MoreIn a conversation with WIRED, former representative Will Hurd talked AI, the metaverse, China, and how ill-prepared legislators are to grapple with any of it.
The Future of Tech Is Here. Congress Isn’t Ready for It Read MoreA Times investigation reveals how Israel reaped diplomatic gains around the world from NSO’s Pegasus spyware — a tool America itself purchased but is now trying to ban.
The Battle for the World’s Most Powerful Cyberweapon Read MoreZelle, the payments platform used by millions of customers, is a popular target of scammers. But banks have been reluctant to make fraud victims whole — despite owning the system.
Fraud Is Flourishing on Zelle. The Banks Say It’s Not Their Problem. Read MoreDisappointed with the lack of US response to the Hermit Kingdom’s attacks against US security researchers, one hacker took matters into his own hands.
North Korea Hacked Him. So He Took Down Its Internet Read MoreAmerica’s top spy and the future of surveillance.
America’s Top Spy Talks Snowden Leaks and Our Ominous Future Read MoreMeet the hackers who, this weekend, will try to commandeer an actual orbiter as part of a Defcon contest hosted by the Air Force and the Defense Digital Service.
The Feds Want These Teams to Hack a Satellite—From Home Read More