World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

Auto Draft
EDUCATION & RESEARCH
February 22, 2022

Singapore to Build National Quantum-Safe Network That Provides Robust Cybersecurity for Critical Infrastructure

Singapore’s Quantum Engineering Programme (QEP) will start conducting nationwide trials of quantum-safe communication technologies that…

0 Shares
Owner February 22, 2022
Auto Draft
EDUCATION & RESEARCH
February 22, 2022

How Picking Up Your Smartphone Could Reveal Your Identity

The time a person spends on different smartphone apps is enough to identify them from…

0 Shares
Owner February 22, 2022
Toward a Stronger Defense of Personal Data
STRATEGY & THREATS
February 22, 2022

Toward a Stronger Defense of Personal Data

A heart attack patient, recently discharged from the hospital, is using a smartwatch to help…

0 Shares
Owner February 22, 2022
Rutgers Researchers Discover Security Vulnerabilities in Virtual Reality Headsets
EDUCATION & RESEARCH
February 11, 2022

Rutgers Researchers Discover Security Vulnerabilities in Virtual Reality Headsets

Researchers at Rutgers University-New Brunswick have published “Face-Mic,” the first work examining how voice command features on…

0 Shares
Owner February 11, 2022
Real-World Experience in Virtual Safety Gives Students Cybersecurity Skills Via Department of Defense Partnership
EDUCATION & RESEARCH
February 8, 2022

Real-World Experience in Virtual Safety Gives Students Cybersecurity Skills Via Department of Defense Partnership

At a U.S. Army base command center, a computer beeps and displays a warning: the…

0 Shares
Owner February 8, 2022
Is the New Apple Airtag a Friendly Accessory or Stalking Device?
STRATEGY & THREATS
February 8, 2022

Is the New Apple Airtag a Friendly Accessory or Stalking Device?

The Apple AirTag, the newest addition to the Apple family, launched last year and is…

0 Shares
Owner February 8, 2022
Book Traces Evolution of Computer from Unusual to Ubiquitous
INDUSTRY & COMMERCE
February 1, 2022

Book Traces Evolution of Computer from Unusual to Ubiquitous

Over the last 50 years, the computer has been transformed from a hulking scientific super-tool…

0 Shares
Owner February 1, 2022
Cyberattacks Increasingly Hobble Pandemic-Weary U.S. Schools
STRATEGY & THREATS
January 31, 2022

Cyberattacks Increasingly Hobble Pandemic-Weary U.S. Schools

For teachers at a middle school in New Mexico’s largest city, the first inkling of…

0 Shares
Owner January 31, 2022
How the Biden Administration Is Making Gains in an Uphill Battle Against Russian Hackers
POLICY & GOVERNANCE
January 30, 2022

How the Biden Administration Is Making Gains in an Uphill Battle Against Russian Hackers

On Jan. 14, 2022, the FSB, Russia’s domestic intelligence service, announced that it had broken…

0 Shares
Owner January 30, 2022
Russia Could Unleash Disruptive Cyberattacks Against the Us – but Efforts to Sow Confusion and Division Are More Likely
STRATEGY & THREATS
January 30, 2022

Russia Could Unleash Disruptive Cyberattacks Against the Us – but Efforts to Sow Confusion and Division Are More Likely

As tensions mount between Russia and the West over Ukraine, the threat of Russian cyberattacks…

0 Shares
Owner January 30, 2022
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT