World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

Researchers Demystify Centralization in Cryptocurrency Mining
EDUCATION & RESEARCH
May 15, 2019

Researchers Demystify Centralization in Cryptocurrency Mining

Blockchain technology has been considered as the most revolutionizing invention since the Internet. Due to…

0 Shares
Owner May 15, 2019
Is Piracy Helping or Hurting Online Word of Mouth Buzz Around Motion Picture Releases?
INDUSTRY & COMMERCE
May 15, 2019

Is Piracy Helping or Hurting Online Word of Mouth Buzz Around Motion Picture Releases?

Key Takeaways: Post-release piracy is associated with a three-percent increase in revenues. Pre-release piracy is…

0 Shares
Owner May 15, 2019
People More Likely to Trust Machines Than Humans with Their Private Information
EDUCATION & RESEARCH
May 13, 2019

People More Likely to Trust Machines Than Humans with Their Private Information

Not everyone fears our machine overlords. In fact, according to Penn State researchers, when it…

0 Shares
Owner May 13, 2019
Study Finds Wi-Fi Location Affects Online Privacy Behavior
EDUCATION & RESEARCH
May 10, 2019

Study Finds Wi-Fi Location Affects Online Privacy Behavior

Does sitting in a coffee shop versus at home influence a person’s willingness to disclose…

0 Shares
Owner May 10, 2019
Location and Brand Affect People’s Trust in Cloud Services
INDUSTRY & COMMERCE
May 10, 2019

Location and Brand Affect People’s Trust in Cloud Services

People’s stereotypes regarding different locations around the world influence whether they feel secure in storing…

0 Shares
Owner May 10, 2019
Design Flaws Create Security Vulnerabilities for ‘Smart Home’ Internet-Of-Things Devices
STRATEGY & THREATS
May 6, 2019

Design Flaws Create Security Vulnerabilities for ‘Smart Home’ Internet-Of-Things Devices

Researchers at North Carolina State University have identified design flaws in “smart home” Internet-of-Things (IoT)…

0 Shares
Owner May 6, 2019
New Technique Uses Power Anomalies to ID Malware in Embedded Systems
STRATEGY & THREATS
April 29, 2019

New Technique Uses Power Anomalies to ID Malware in Embedded Systems

Researchers from North Carolina State University and the University of Texas at Austin have developed…

0 Shares
Owner April 29, 2019
New Technique Uses Power Anomalies to ID Malware in Embedded Systems
STRATEGY & THREATS
April 29, 2019

Tech Fixes Can’t Protect us from Disinformation Campaigns

More than technological fixes are needed to stop countries from spreading disinformation on social media…

0 Shares
Owner April 29, 2019
New Strategy for Credit Card Fraud Detection
STRATEGY & THREATS
April 21, 2019

New Strategy for Credit Card Fraud Detection

A team of researchers has developed a new strategy for detecting credit card fraud using incentives…

0 Shares
Owner April 21, 2019
The New Digital Divide Is Between People Who Opt Out of Algorithms and People Who Don’t
EDUCATION & RESEARCH
April 21, 2019

The New Digital Divide Is Between People Who Opt Out of Algorithms and People Who Don’t

Every aspect of life can be guided by artificial intelligence algorithms – from choosing what…

0 Shares
Owner April 21, 2019
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT