Cybersecurity

Image of a dissolving lock with text: Emerging AI Cybersecurity Challenges and Solutions
Article/Publication

Emerging AI Cybersecurity: Challenges and Solutions

Did you know that the information you enter into a chatbot could also be used to train AI in the future? This can result in language models that reveal sensitive or private information to third parties. IEEE Impact Creators weigh in on how to defend against data leakage on IEEE Transmitter.
Hands are holding a tablet with an image of a padlock and the word Privacy on the screen
Education Module

Digital Privacy: Principles, Regulations, and Ethics

Explore the ethical foundations of privacy, common privacy principles, and the key drivers of digital privacy around the globe, namely seminal laws and regulations, in this new course from IEEE Digital Privacy.
A screenshot of the WannaCry virus demanding bitcoin in exchange of file release and recovery.
Article/Publication

WannaCry Update: Microsoft Pushes a “Geneva Convention” to Thwart Cyberattacks

How a headline-grabbing moment in cybersecurity was used as a call for a “Digital Geneva Convention” to limit and defang future cyberattacks.
An eerie red landscape of robots on an assembly line.
Article/Publication

New Report Highlights Dangers of Hacked Factory Robots

Cybersecurity firm describes how malevolent hackers might compromise various kinds of industrial robots.
A man in a brown tie and jacket gesticulating.
Article/Publication

Why Hardware Engineers Have to Think Like Cybercriminals, and Why Engineers Are Easy to Fool

Scott Borg, director of the U.S. Cyber Consequences Unit, says hardware design engineers hold the future of cybersecurity in their hands.
Digital padlock with text: The Moral Importance of Cybersecurity
Video

The Moral Importance of Cybersecurity

What benefits and harms can cybersecurity bring, either from its implementation or from a lack of it? And who is accountable for these? This panel addresses the ethical benefits and risks associated with cybersecurity technologies.
Padlock on a background of cascading numbers.
Education Module

Ethical Hacking: Enumeration

This course reviews the concept of enumeration. Enumeration is the process of identifying resources on a network, and extracting information from a system. Techniques for retrieving information such as usernames, sharenames, network information and other vital pieces of information will be discussed.
Hands on a keyboard against a computer screen cooding.
Education Module

Ethical Hacking: Evasion Techniques

Evasion in a network is the process of bypassing a security check in order to attack or exploit the network. In this course we discuss techniques used by hackers to evade detection by the target of an attack to help you recognize and react to evasions.
Man in suit pointing to a figure of a bad man implying malware.
Education Module

Ethical Hacking: Malware Fundamentals

Malware is harmful software that is intended to cause damage or to disable computers and networks. This course takes an in-depth look at the nature of malware and its many different forms. Topics covered will include viruses, Trojans, rootkits, buffer overflows and other related forms of malware.