World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

Vulnerability of Cloud Service Hardware Uncovered
EDUCATION & RESEARCH
June 1, 2019

Vulnerability of Cloud Service Hardware Uncovered

Field-programmable gate arrays (FPGAs) are, so to say, a computer manufacturer’s “Lego bricks”: electronic components…

0 Shares
Owner June 1, 2019
Secure Metropolitan Quantum Networks Move a Step Closer
EDUCATION & RESEARCH
June 1, 2019

Secure Metropolitan Quantum Networks Move a Step Closer

Successful new field tests of a continuous-variable quantum key distribution (CV-QKD) system over commercial fiber…

0 Shares
Owner June 1, 2019
Outsmarting Deep Fakes: AI-Driven Imaging System Protects Authenticity
STRATEGY & THREATS
June 1, 2019

Outsmarting Deep Fakes: AI-Driven Imaging System Protects Authenticity

To thwart sophisticated methods of altering photos and video, researchers at the NYU Tandon School…

0 Shares
Owner June 1, 2019
From Viruses to Social Bots, Researchers Unearth the Structure of Attacked Networks
STRATEGY & THREATS
June 1, 2019

From Viruses to Social Bots, Researchers Unearth the Structure of Attacked Networks

The human body’s mechanisms are marvelous, yet they haven’t given up all their secrets. In…

0 Shares
Owner June 1, 2019
Illinois Researchers Add ‘Time-Travel’ Feature to Drives to Fight Ransomware Attacks
STRATEGY & THREATS
June 1, 2019

Illinois Researchers Add ‘Time-Travel’ Feature to Drives to Fight Ransomware Attacks

One of the latest cyber threats involves hackers encrypting user files and then charging “ransom”…

0 Shares
Owner June 1, 2019
Artificial Intelligence Becomes Life-Long Learner with New Framework
POLICY & GOVERNANCE
May 20, 2019

Artificial Intelligence Becomes Life-Long Learner with New Framework

A project of the U.S. Army has developed a new framework for deep neural networks…

0 Shares
Owner May 20, 2019
Following on from Meltdown and Spectre: Austrian Researchers Discover New Security Flaws
STRATEGY & THREATS
May 17, 2019

Following on from Meltdown and Spectre: Austrian Researchers Discover New Security Flaws

ZombieLoad and Store-to-Leak Forwarding are the names of the new exploits which have just been…

0 Shares
Owner May 17, 2019
Same Computer Password for the Last 10 Years? You Might Need a Vibrating Cybernudge
STRATEGY & THREATS
May 17, 2019

Same Computer Password for the Last 10 Years? You Might Need a Vibrating Cybernudge

Technology used in exercise and lifestyle apps may hold the key to answering that most…

0 Shares
Owner May 17, 2019
Fearful Customers Sensitive to Size and Scope of a Data Breach While Angry Customers Are Not
INDUSTRY & COMMERCE
May 17, 2019

Fearful Customers Sensitive to Size and Scope of a Data Breach While Angry Customers Are Not

Customers who feel afraid in the wake of a data breach care more about the…

0 Shares
Owner May 17, 2019
Children Describe Technology That Gives Them a Sense of Ambiguity as ‘Creepy’
EDUCATION & RESEARCH
May 17, 2019

Children Describe Technology That Gives Them a Sense of Ambiguity as ‘Creepy’

Many parents express concerns about privacy and online safety in technology designed for their children.…

0 Shares
Owner May 17, 2019
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT