Cyber Threats: Only Getting Worse
It seems like the cyber domain has recently been awash in controversy. From major hacks that compromise the information of millions of people, to bitter […] More
It seems like the cyber domain has recently been awash in controversy. From major hacks that compromise the information of millions of people, to bitter […] More
Despite being the wellspring for cutting-edge technology brands such as Samsung, Sony, and HTC, Asia has proven to be less adept at managing a different […] More
South Korea—boasting cutting-edge digital technology, efficient computer networks, and the world’s top high-speed Internet penetration rate—has earned global renown as a “strong Internet nation.” Behind […] More
Thanks to breach disclosure regulations in the U.S. and U.K., we regularly learn about the latest capers from the headlines. Without a doubt, these countries […] More
On Friday, Dyn, a company that routes and manages internet traffic, suffered multiple Distributed Denial of Service (DDoS) attacks throughout the day. Major sites such […] More
Some stunning things have happened in the past year. Cars were remotely hacked and run off the road. Thieves digitally stole cars in volume, at […] More
The Internet-of-Things has for years promised to usher in a new wave of innovation. It has sometimes been called the Internet-of-Everything or Internet 3.0—grand language […] More
The Sony Pictures Entertainment hack served as a very public wake-up call to the dangers posed by malicious hackers. In the course of the attacks, […] More
Dark Hotel, Crouching Yeti, Machete, Sofacy, Sandworm – what do these words have in common? They are all names given to hacker groups that have […] More
When hackers recently breached the computer systems of the Bangladesh Central Bank and tried to steal nearly $1 billion from its account at the Federal […] More
When you think of cybersecurity, you probably think about firewalls and passwords – but the ever-changing cyber threat has forced the technology to move far […] More
After years of public attention around Bitcoin, its underlying technology—the blockchain—is taking over the discussion with its potential to address fundamental challenges across a number […] More
Quantum cybersecurity covers the application of quantum technology to enhance cybersecurity. It includes quantum random number generation, which strengthens security through the delivery of stronger […] More
Do you bring your own laptop to the office, or does your phone connect to your company’s Wi-Fi network? If so, then you need to […] More
Every day we read another report lamenting the limited workforce that possesses the technical skills so badly needed in cybersecurity. This is a significant challenge […] More
In February, Hollywood Presbyterian Hospital very publicly paid $17,000 to regain access to its files after being infected with a type of malware called ransomware. […] More
Healthcare providers represent an attractive target for hackers due to the wealth of information they store about their patients. The Cipher Brief Spoke to Greg […] More
On February 5th, Hollywood Presbyterian Medical Center lost access to its computers after being infected with ransomware – a type of malware that hold files […] More
Search