Source: theconversation.com

My thoughts are my password, because my brain reactions are unique - Cyber security news

My thoughts are my password, because my brain reactions are unique

Some cybersecurity apps could be worse for privacy than nothing at all - Cyber security news

Some cybersecurity apps could be worse for privacy than nothing at all

Blockchains won’t fix internet voting security – and could make it worse - Cyber security news

Blockchains won’t fix internet voting security – and could make it worse

Open-source hardware could defend against the next generation of hacking - Cyber security news

Open-source hardware could defend against the next generation of hacking

Weaponized information seeks a new target in cyberspace: Users’ minds - Cyber security news

Weaponized information seeks a new target in cyberspace: Users’ minds

With hacking of US utilities, Russia could move from cyberespionage toward cyberwar - Cyber security news

With hacking of US utilities, Russia could move from cyberespionage toward cyberwar

What Hollywood gets right and wrong about hacking - Cyber security news

What Hollywood gets right and wrong about hacking

Microprocessor designers realize security must be a primary concern - Cyber security news

Microprocessor designers realize security must be a primary concern

How quantum computers could steal your bitcoin - Cyber security news

How quantum computers could steal your bitcoin

CFO survey: firms being hacked, taking action to protect data - Cyber security news

CFO survey: firms being hacked, taking action to protect data

How Australian universities can get better at cyber security - Cyber security news

How Australian universities can get better at cyber security

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it - Cyber security news

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it

Why the incoming EU copyright law will undermine the free internet - Cyber security news

Why the incoming EU copyright law will undermine the free internet

HealthEngine may be in breach of privacy law in sharing patient data - Cyber security news

HealthEngine may be in breach of privacy law in sharing patient data

Why 50,000 ships are so vulnerable to cyberattacks - Cyber security news

Why 50,000 ships are so vulnerable to cyberattacks

Revisiting metadata retention in light of the government’s push for new powers - Cyber security news

Revisiting metadata retention in light of the government’s push for new powers