BCI devices that read minds and act on intentions can change lives for the better. But they could also be put to nefarious use in the not-too-distant future. Now’s the time to think about risks.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Simply updating and patching an organisation’s computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
The technical consensus is clear: Adding ‘backdoors’ to encryption algorithms weakens everyone’s security. So what are the police and intelligence agencies to do?
Richard Forno, University of Maryland, Baltimore County and Anupam Joshi, University of Maryland, Baltimore County
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.
WikiLeaks’ latest release details what it claims is the CIA’s hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Recent developments at the United Nations and the G-20 suggest that the well-known human rights to privacy and freedom of expression may soon be formally extended to online communications.
The prospect of foreign hackers interfering with democracy is not just an American story. It could happen in Australia too, and we need to guard against it.
Prime Minister Malcolm Turnbull and senior ministers have been criticised over their use of WhatsApp, which can leave users vulnerable if their phones are hacked, attacked by malware, or simply stolen.