January 20, 2022
11 11 11 AM
What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is, and what’s at stake
mRNA vaccines, asteroid missions, and collaborative robots: what to watch in science in 2022 – podcast
Pentagon report says UFOs can’t be explained, and this admission is a big deal
How colonialism’s legacy makes it harder for countries to escape poverty and fossil fuels today
Schools must act carefully on students’ off-campus speech, Supreme Court rules
Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be?
Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has
Fast computers, 5G networks and radar that passes through walls are bringing ‘X-ray vision’ closer to reality
Study shows AI-generated fake reports fool experts
AzuraCast, open source Web Radio Manager
Latest Post
What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is, and what’s at stake mRNA vaccines, asteroid missions, and collaborative robots: what to watch in science in 2022 – podcast Pentagon report says UFOs can’t be explained, and this admission is a big deal How colonialism’s legacy makes it harder for countries to escape poverty and fossil fuels today Schools must act carefully on students’ off-campus speech, Supreme Court rules Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be? Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has Fast computers, 5G networks and radar that passes through walls are bringing ‘X-ray vision’ closer to reality Study shows AI-generated fake reports fool experts AzuraCast, open source Web Radio Manager
Jan
2022
7

What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is, and what’s at stake

Santiago Torres-Arias, Purdue University Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide

Jun
2021
24

Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be?

Merrill Warkentin, Mississippi State University The headlines are filled with news about ransomware attacks tying up organizations large and small, data breaches at major brand-name companies and cyberattacks by shadowy hackers associated with Russia, China and North Korea. Are these threats to

Jun
2021
21

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has Scott Shackelford, Indiana University President Joe Biden’s cybersecurity executive order, signed May 12, 2021, calls for the federal government to adopt a “zero-trust

%d bloggers like this: