World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

What’s Been Done to Fight Cybercrime in East Africa
STRATEGY & THREATS
January 16, 2020

What’s Been Done to Fight Cybercrime in East Africa

East Africa attracts millions of tourists every year. Over the past 10 years, its earnings…

0 Shares
Owner January 16, 2020
Growth in Data Breaches Shows Need for Government Regulations
POLICY & GOVERNANCE
January 16, 2020

Growth in Data Breaches Shows Need for Government Regulations

Do you remember when 40 million was a large number? Forty million dollars in sales,…

0 Shares
Owner January 16, 2020
How Real Is the Threat of Cyberwar Between Iran and the U.S?
STRATEGY & THREATS
January 16, 2020

How Real Is the Threat of Cyberwar Between Iran and the U.S?

The world shook at the news in early January that a US drone strike had…

0 Shares
Owner January 16, 2020
Cyberspace Is the Next Front in Iran-U.S. Conflict – and Private Companies May Bear the Brunt
STRATEGY & THREATS
January 16, 2020

Cyberspace Is the Next Front in Iran-U.S. Conflict – and Private Companies May Bear the Brunt

Iran and other nations have waged a stealth cyberwar against the United States for at…

0 Shares
Owner January 16, 2020
Risk of cyberattack for individuals not substantially greater, according to Virginia Tech expert
STRATEGY & THREATS
January 13, 2020

Risk of Cyberattack for Individuals Not Substantially Greater

While individuals with access to critical infrastructure systems of any type should be vigilant in…

0 Shares
Owner January 13, 2020
Online Hate Speech Could Be Contained Like a Computer Virus, Say Cambridge Researchers
STRATEGY & THREATS
December 18, 2019

Online Hate Speech Could Be Contained Like a Computer Virus, Say Cambridge Researchers

The spread of hate speech via social media could be tackled using the same “quarantine”…

0 Shares
Owner December 18, 2019
Email Users Should Have ‘More Control’ Over Post-Mortem Message Transmission
INDUSTRY & COMMERCE
December 18, 2019

Email Users Should Have ‘More Control’ Over Post-Mortem Message Transmission

Email users should have far more control over the transmission of their messages upon death,…

0 Shares
Owner December 18, 2019
How Vulnerable Is Your Car to Cyberattacks?
EDUCATION & RESEARCH
December 18, 2019

How Vulnerable Is Your Car to Cyberattacks?

The emergence of smart cars has opened the door to limitless possibilities for technology and…

0 Shares
Owner December 18, 2019
Top 25 Most Dangerous Software Errors
STRATEGY & THREATS
December 11, 2019

Top 25 Most Dangerous Software Errors

From smartphone games and personal email accounts to international banking and hospital records, software is…

0 Shares
Owner December 11, 2019
Mobile Devices Blur Work and Personal Privacy Raising Cyber Risks
EDUCATION & RESEARCH
December 5, 2019

Mobile Devices Blur Work and Personal Privacy Raising Cyber Risks

Organisations aren’t moving quickly enough on cyber security threats linked to the drive toward using…

0 Shares
Owner December 5, 2019
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT