World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

New Sandboxing Approach in Web Browser Increases Security
STRATEGY & THREATS
February 25, 2020

New Sandboxing Approach in Web Browser Increases Security

A powerful new approach to securing web browsers, using a tool called WebAssembly, is getting…

0 Shares
Owner February 25, 2020
Hackers Could Shut Down Satellites – or Turn Them into Weapons
STRATEGY & THREATS
February 12, 2020

Hackers Could Shut Down Satellites – or Turn Them into Weapons

Last month, SpaceX became the operator of the world’s largest active satellite constellation. As of…

0 Shares
Owner February 12, 2020
AI Could Constantly Scan the Internet for Data Privacy Violations, a Quicker, Easier Way to Enforce Compliance
STRATEGY & THREATS
February 10, 2020

AI Could Constantly Scan the Internet for Data Privacy Violations, a Quicker, Easier Way to Enforce Compliance

You’re trailing bits of personal data – such as credit card numbers, shopping preferences and…

0 Shares
Owner February 10, 2020
Thwarting Hacks by Thinking Like the Humans Behind Them
STRATEGY & THREATS
February 6, 2020

Thwarting Hacks by Thinking Like the Humans Behind Them

If we understood the humans behind hacking incidents – and their intent – could we…

0 Shares
Owner February 6, 2020
Improving AI’s Ability to Identify Students Who Need Help
EDUCATION & RESEARCH
February 5, 2020

Improving AI’s Ability to Identify Students Who Need Help

Researchers have designed an artificial intelligence (AI) model that is better able to predict how…

0 Shares
Owner February 5, 2020
Auto Draft
STRATEGY & THREATS
January 27, 2020

The Great E-Scooter Hack

Micromobility vehicles, such as e-scooters, zip in and out of traffic. In San Antonio alone,…

0 Shares
Owner January 27, 2020
Organized Cybercrime — Not Your Average Mafia
STRATEGY & THREATS
January 24, 2020

Organized Cybercrime — Not Your Average Mafia

Does the common stereotype for “organized crime” hold up for organizations of hackers? Research from…

0 Shares
Owner January 24, 2020
How Iran’s Military Outsources Its Cyberthreat Forces
POLICY & GOVERNANCE
January 22, 2020

How Iran’s Military Outsources Its Cyberthreat Forces

In the wake of the U.S. killing of a top Iranian general and Iran’s retaliatory…

0 Shares
Owner January 22, 2020
DHS S&T Awards 0K to Maryland Company for Cybersecurity of Emergency Communicators
POLICY & GOVERNANCE
January 22, 2020

DHS S&T Awards $750K to Maryland Company for Cybersecurity of Emergency Communicators

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) awarded $750,000 to SecuLore Solutions, an…

0 Shares
Owner January 22, 2020
Detecting and Mitigating Network Attacks with a Multi-Prong Approach
EDUCATION & RESEARCH
January 16, 2020

Detecting and Mitigating Network Attacks with a Multi-Prong Approach

To solve a problem, you must first see the problem. More than that, whatever fallout…

0 Shares
Owner January 16, 2020
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT