Experts and local law enforcement speak about living in the Capital District post-9/11
"Brian Nussbaum, an assistant professor at UAlbany’s College of Emergency Preparedness, Homeland Security and Cybersecurity who specializes in topics inclu…
"Brian Nussbaum, an assistant professor at UAlbany’s College of Emergency Preparedness, Homeland Security and Cybersecurity who specializes in topics inclu…
News of governments such as Russia and North Korea deploying their tech teams to hack into companies for political reasons has made headlines (think Sony after…
WIRED ICON Edward Snowden, NSA whistle-blower NOMINATES Malkia Cyril, Founder of the Center for Media Justice, cofounder of Media Action Grassroots Netw…
"Scott Shackelford, chair of the cybersecurity program at Indiana University, Bloomington, says one big cause of the shortage is the lack of a focused tale…
""It's deeply unsurprising to see a cyber mob descend. There’s a very quick snowballing that happens, where it’s maybe one or two people, then all…
""It's devastating and we deal with the survivors of this kind of sexual extortion and violence all the time," said McGill education professo…
We know that smart phones and other information technology are changing the way we live and the way we relate to other people, but could they actually be making…
"“We’re looking at creative ways to address these problems, so we can address, and unpack and undo the climate of rape culture and climate of sexism,” said…
"Jen King was in a hurry to get out the door of her Bay Area home on a recent morning, and she missed a call to her cell phone because of it. The phone num…
"Those types of efforts could increase if the intelligence community agrees to weigh in on deepfakes, said Danielle Citron, a privacy law expert at the Uni…
Two important current trends in Internet law go together in ways that aren’t getting enough attention. They should, though, because the overlap is well on its w…
"In a new paper, Riana Pfefferkorn at Stanford Law School’s Center for Internet and Society (CIS) analyzes the cybersecurity risks of this practice for all…