List of Cyber Security & Hacking articles
-
Voters in Chestertown, Maryland, cast ballots at the Kent County Public Library in Maryland's early voting on October 25, 2018. To Protect Democracy, Protect the Internet
The voluntary efforts of tech companies aren’t enough. The U.S. government needs to regulate social media platforms and make election interference illegal.
-
Former U.S. Marine Paul Whelan awaits a hearing in a Moscow court. Family of American Jailed in Russia Vows to Keep Fighting
Long sentence for alleged espionage is a “gut punch” but opens door to negotiations.
-
An cybersecurity expert working for the Israeli company Commun.it analyzes networks of fake users in Bnei Brak, Israel, on Jan. 23, 2019. Israel and Iran Just Showed Us the Future of Cyberwar With Their Unusual Attacks
A shadow war fought largely in secret has reached a new, more open phase.
-
A police officer watches television monitors showing a fraction of London's CCTV camera network. 4 Reads on a Frighteningly Plausible Vision of the Future
“Burn-In” fascinated and scared me as a cop, spy, writer, and citizen.
-
A participant stands near a screen during the ethical hacking contest Insomni'hack in Geneva on March 21, 2014. Want to Avoid the Next Pandemic? Hire a Devil’s Advocate.
Forcing governments and businesses to institutionalize doubt—by putting hackers and red teams on the payroll—would stop groupthink and could prevent catastrophes.
-
The new French self-attested movement document is displayed on a smartphone on April 6—the 21st day of a strict lockdown in France to stop the spread of COVID-19. Privacy and the Pandemic: Time for a Digital Bill of Rights
Democratic governments need digital tools and personal data to combat the crisis, but too much sharing can be dangerous to individuals. How can they strike the right balance?
-
Thai locals download music at an internet cafe in downtown Bangkok on Feb. 3, 2006. Thais Show How to Beat China’s Online Army
A pop culture battle turned into a nationalist frenzy and a propaganda problem.
-
A medical staffer works on a computer at a hospital in Bergamo, Italy Note to Nations: Stop Hacking Hospitals
Why now is the time for global cyber-norms to protect health infrastructure.
-
books-in-brief-spring-20202 Books in Brief
FP staff review recent releases on Chinese industrial espionage, the dissent channel in American diplomacy, and British anti-colonialism.
-
A member of the Iraqi forces walks past a mural bearing the flag of the Islamic State. Self-Isolation Might Stop Coronavirus, but It Will Speed the Spread of Extremism
Millions of people stuck at home will turn to social media, where disinformation is rife. Radical Islamists and far-right groups are exploiting widespread confusion and fear to spread hate.
-
Russian President Vladimir Putin speaks during his annual press conference in Moscow on Dec. 19, 2019. As the West Panics, Putin Is Watching
The coronavirus crisis is exposing the West’s weaknesses—and adversaries of the U.S. and EU are paying close attention so they can exploit vulnerabilities in a future conflict.
-
A researcher handles coronavirus samples at a laboratory. How Hackers and Spies Could Sabotage the Coronavirus Fight
Intelligence services have a long history of manipulating information on health issues, and an epidemic is especially tempting for interference. Why aren’t we better prepared?
-
A woman wears a face mask as a preventative measure against the COVID-19 coronavirus disease Coronavirus Crisis Pushes States to Quarantine Online Information
Epidemics raise worrying questions about how to limit state power.
-
A young boy reacts as he and thousands of others line up to purchase face masks from a makeshift stall after waiting for hours in Hong Kong on Feb. 5. An Epidemic of Wuhan Virus Misinformation Is Spreading Online
Social media giants are finding it hard to quarantine fake news.
-
Prime Minister Boris Johnson hosts Chinese New Year celebrations outside 10 Downing Street on January 24 in London. Britain Knows It’s Selling Out Its National Security to Huawei
London’s justification for cooperating with the Chinese telecommunications company is riddled with obvious contradictions.