News

2020

September

August

In the world of competitive hacking, to be the best, you need to compete against the best.

July

Editor’s note: This story is part of a series about the impacts of disinformation, how to guard against it and what researchers are doing to stop its spread.

In partnership with Arizona State University’s Threatcasting Lab, the Army Cyber Institute created a new graphic novel, “Invisible Force,” as a “science fiction prototype,” which is a fiction

April

News outlets, along with everyone else in the world, are sharing their facts, opinions and advice on COVID-19, the illness caused by the novel coronavirus.

March

New York Gov. Andrew Cuomo warned Thursday that misinformation and fear related to the coronavirus are in many ways “more dangerous than the virus.”  

The American economy lost between $57 and 109 billion in 2016 from c

Arizona entrepreneurs who are enthusiastic about bringing a new technology to market face many obstacles, but many agree the biggest determinant to developing their vision is funding. 

February

Arizona State University's Global Security Initiative is expanding its efforts to prepare the next generation of cybersecurity professionals for the ca

2019

December

Arizona State University students maintain at least a half dozen clubs dedicated to some form of cybersecurity.

Americans are growing more and more politically polarized on controversial issues like immigration, health care, gun control and women’s rights.

November

Russian grid hacking. Cyberinfiltration of U.S. universities. Rampant data exposures. Spy tool-breaching. Shadow Brokers. And more.

Eighth grade student Debbie from Country Meadows Elementary School in Peoria dreams of becoming a computer programmer someday. But until this week, she had never met a woman in that role.

September

Each year more than 50,000 cybersecurity professionals from around the globe come together to attend the world’s preeminent cybersecurity gathering, RSA Con

The average cost of a single data breach is nearly $3.9 million. Globally, the cost of cybercrime is expected to top $2 trillion this year, according to Juniper Research.

August

Just as it’s increasingly common to find a smart home assistant on a countertop or an internet-connected camera at the front door, smart toys are also becoming ubiquitous in the playroom.

They order more paper towels for you and set a timer with just a phrase. They let you know who’s at the door before you open it.

Consumers have increasingly become victims of telephone scams — including the recent proliferation of Social Security number suspension ploys — to gain access to their personal information.

North Korean hackers squeeze $2 billion out of cryptocurrency networks. Russian hackers breach networks using "internet of things" devices.

May

Maintaining software is costly, and for developers like Facebook and Microsoft, repairing software bugs can be very expensive.

Fake news. Weaponized narratives. Agitprop.

It’s all chatter, until someone puts down the keyboard, picks up a gun and walks into a house of worship.

How do you fight that?

The world’s top chess player isn’t a human or a computer, it’s a “centaur” — a hybrid chess-playing team composed of a human and a computer.

Last month, more than 50,000 cybersecurity professionals from around the globe converged on San Francisco to attend the world’s preeminent cybersecurity gathering, the 

April

Electrical engineering researchers are constantly improving the technologies that impact our everyday lives.

In August 1970, a woman named Patricia Ann Parker filed a paternity suit against Elvis Presley in Los Angeles Superior Court.

March

Law enforcement organizations across the United States have recently arrested

February

U.S. Director of National Intelligence Daniel Coats released the 2019 National Intelligence Strategy in late January.

January

Arizona State University Assistant Professor Tiffany Bao won best paper for her collaborative research on cyberwarfare at the NSA’s sixth annual

2018

October

In 1855, an English photographer named Roger Fenton traveled to Crimea to document the war there.

Cyberattacks make the headlines seemingly every week, with few untouched by the breaches. But there is positive news as researchers take aim at malicious hackers.

September

When flying to Beijing, you’ll likely have to take multiple flights and pass through customs to get to your destination.

July

Macy’s has announced a data breach involving thousands of Macys.com and Bloomingdales.com customer cred

May

If you have checked your email, visited a website or opened an app in the past few weeks, you've probably seen an updated privacy policy or terms of service agreement. What's going on? 

April

In 2013 Arizona State University researchers Paulo and Jana Shakarian collaborated on a book that explored cyberwarfare from “a human-centric viewpoint,” as Paulo Shakarian described it.

Military experts, strategists, academics and national security thought leaders will gather at an international conference Monday hosted by Arizona State University and D.C.-based think tank New Ame

March

In today’s fast-moving, high-tech world, we leave digital footprints nearly everywhere we go, our sensitive personal information is under attack from those who want to track our habits or steal our

More than 40,000 cybersecurity professionals will descend upon San Francisco's Moscone Center in mid-April for the annual RSA Conference, "Where the World Talks Security."

Our current approach to cybersecurity is not working and it threatens our democracy, economy and critical infrastructure, according to ASU Biodesign Professor Stephanie Forrest, who spoke to a grou