FBI Takes Down Hive Criminal Ransomware Group
A cybersecurity expert explains how the FBI’s operation against the ransomware group Hive will impact the rest of this criminal industry
A cybersecurity expert explains how the FBI’s operation against the ransomware group Hive will impact the rest of this criminal industry
A new algorithm is probably not efficient enough to crack current encryption keys—but that’s no reason for complacency, researchers say
Scientific American technology editor Sophie Bushwick explains how Iran is using surveillance tech against vulnerable citizens.
The Iranian government is taking advantage of Internet shutdowns to push citizens onto a local intranet that is vulnerable to surveillance and censorship
The Census Bureau must improve its data anonymization methods to protect vulnerable groups
A cybersecurity expert explains how we might learn to trust our phones again
Data breaches involve the same old mistakes; we must break the cycle
From figuring out how often you go to the bathroom to potentially being used to prosecute you, your trusty smartphone might not be so trusty in a post-Roe world.
It’s not government Americans don’t trust with their data; it’s the opposite political party
To protect personal information from companies that sell data, some individuals are relying on privacy guides instead of government regulation or industry transparency
Scams and volatility plague this market, and the Biden administration is still trying to decide where the federal government fits in
The technology could help patients exert control over their medical data
When Russia invaded Ukraine, many analysts expected an unprecedented level of cyberattacks—which so far haven’t materialized
The Putin regime has a portfolio of digital tools to control information and crack down on protests within the country
A falsified video would be an update on the traditional use of propaganda campaigns during warfare
Government agencies are tapping a facial recognition company to prove you’re you
Organizations can act to protect themselves, but collaboration is the best defense
A cybersecurity expert explains how the widely used logging software is already making us more vulnerable
The technique is the latest method to glean a surprising amount of surveillance from a meager source
Support science journalism.
Thanks for reading Scientific American. Knowledge awaits.
Already a subscriber? Sign in.
Thanks for reading Scientific American. Create your free account or Sign in to continue.
Create Account