World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
World Wide Cyber News
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH
Owner

A Georgia State Cybersecurity Study of the Dark Web Exposes Vulnerability to Machine Identities
EDUCATION & RESEARCH
March 11, 2019

A Georgia State Cybersecurity Study of the Dark Web Exposes Vulnerability to Machine Identities

A thriving marketplace for SSL and TLS certificates–small data files used to facilitate confidential communication…

0 Shares
Owner March 11, 2019
Securing the “Internet of Things” in the Quantum Age
EDUCATION & RESEARCH
March 3, 2019

Securing the “Internet of Things” in the Quantum Age

MIT researchers have developed a novel cryptography circuit that can be used to protect low-power…

0 Shares
Owner March 3, 2019
Nanoparticle Computing Takes a Giant Step Forward
INDUSTRY & COMMERCE
February 27, 2019

Nanoparticle Computing Takes a Giant Step Forward

–  Jinyoung Seo, Sungi Kim, Ha H. Park, Da Yeon Choi, and Jwa-Min Nam, Department of…

0 Shares
Owner February 27, 2019
Most Laptops Vulnerable to Attack Via Peripheral Devices
STRATEGY & THREATS
February 27, 2019

Most Laptops Vulnerable to Attack Via Peripheral Devices

Many modern laptops and an increasing number of desktop computers are much more vulnerable to…

0 Shares
Owner February 27, 2019
Exposing Flaws in Metrics for User Login Systems
STRATEGY & THREATS
February 27, 2019

Exposing Flaws in Metrics for User Login Systems

How good is the research on the success or failure of the system that verifies…

0 Shares
Owner February 27, 2019
Chinese Internet Users Turn to the Blockchain to Fight Against Government Censorship
STRATEGY & THREATS
February 25, 2019

Chinese Internet Users Turn to the Blockchain to Fight Against Government Censorship

Thanks to blockchain, internet users have achieved some victories in the fight against China’s strict…

0 Shares
Owner February 25, 2019
Machines Whisper Our Secrets
STRATEGY & THREATS
February 25, 2019

Machines Whisper Our Secrets

Lab instruments are important tools throughout research and health care. But what if those instruments…

0 Shares
Owner February 25, 2019
AI May Be Better for Detecting Radar Signals, Facilitating Spectrum Sharing
POLICY & GOVERNANCE
February 21, 2019

AI May Be Better for Detecting Radar Signals, Facilitating Spectrum Sharing

When vacationers buy a stake in a beachfront timeshare, they decide in advance who gets…

0 Shares
Owner February 21, 2019
Putting Data Privacy in the Hands of Users
EDUCATION & RESEARCH
February 21, 2019

Putting Data Privacy in the Hands of Users

A new platform developed by MIT and Harvard University researchers ensures that web services adhere…

0 Shares
Owner February 21, 2019
Don’t Be Fooled by Fake Images and Videos Online
STRATEGY & THREATS
February 21, 2019

Don’t Be Fooled by Fake Images and Videos Online

One month before the 2016 U.S. presidential election, an “Access Hollywood” recording of Donald Trump…

0 Shares
Owner February 21, 2019
Older Posts Newer Posts
Latest Posts
  • Uncategorized
    Global Cyber Regulations: Why Fragmentation Is the Real Risk
    Jason February 18, 2026
  • Persistent Threat Actors and the New Logic of Cyber Power
    STRATEGY & THREATS
    Persistent Threat Actors and the New Logic of Cyber Power
    Jason February 8, 2026
  • Why Cybersecurity Education Must Move Beyond Certifications
    EDUCATION & RESEARCH
    Why Cybersecurity Education Must Move Beyond Certifications
    Jason February 8, 2026
  • How Cyber Risk Is Reshaping Business Strategy in 2026
    INDUSTRY & COMMERCE
    How Cyber Risk Is Reshaping Business Strategy in 2026
    Jason February 7, 2026
  • Building a Cybersecurity Workforce for Persistent State-Level Threats
    EDUCATION & RESEARCH
    Building a Cybersecurity Workforce for Persistent State-Level Threats
    Jason January 16, 2026
World Wide Cyber News
World Wide Cyber News
  • HOME
  • ABOUT US
  • PERMISSIONS AND POLICIES
  • STRATEGY & THREATS
  • INDUSTRY & COMMERCE
  • POLICY & GOVERNANCE
  • EDUCATION & RESEARCH

Our site uses cookies. Learn more about our use of cookies: Cookie Policy

ACCEPT