Security

How to keep automated electric vehicles safe

Having your social media account hacked is a pain. Having your credit card account hacked can be devastating. Having your new electric vehicle hacked could be disastrous.

Security

Protecting our energy infrastructure from cyberattack

Almost every day, news headlines announce another security breach and the theft of credit card numbers and other personal information. While having one's credit card stolen can be annoying and unsettling, a far more significant, ...

Security

Cyberattacks: Bigger, smarter, faster

From paralysing the internet in Estonia to a $4.4-million ransom being paid last week after the shutdown of a major US pipeline, we take a look back at 15 years of cyberattacks.

Internet

New cybersecurity guide is the first to gather global expertise

Some of the world's leading experts in cybersecurity have pooled their academic and industry insights to produce an authoritative guide that could help organizations to future proof their resources. The guide, the first of ...

page 1 from 2

Computer insecurity

Many current computer systems have only limited security precautions in place. This computer insecurity article describes the current battlefield of computer security exploits and defenses. Please see the computer security article for an alternative approach, based on security engineering principles.

This text uses material from Wikipedia, licensed under CC BY-SA