Security and Encryption (22)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 15 min
- MIT Tech Review
- 2019
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
- MIT Tech Review
- 2019
-
- 15 min
- MIT Tech Review
- 2019
Triton is the world’s most murderous malware, and it’s spreading
An attack in Saudi Arabia through malware known as Triton demonstrates that hackers, potentially even those belonging to nation-states, are willing to spend considerable time and money to hack into the increasing numbers of targets in industrial internets of things. Such cyber attacks could lead to unsafe workplaces and even catastrophes.
Is the grand increase in industrial convenience and productivity worth the increased risk for cyber attacks? In what ways can using an internet of things to control certain systems increase and decrease workplace safety, especially in more volatile settings?
-
- Carnegie Endowment for International Peace
- 2022
This article talks about Nigeria’s financial industry’s need to prioritize cybersecurity in order to protect fintech customers from cybercrime.
- Carnegie Endowment for International Peace
- 2022
Cybersecurity in Nigeria’s Financial Industry: Enhancing Consumer Trust and Security
This article talks about Nigeria’s financial industry’s need to prioritize cybersecurity in order to protect fintech customers from cybercrime.
Who should be responsible for protecting fintech customers’ cybersecurity? Who is impacted by fintech cybercrime? What are the harms, specific to fintech industries, of weak cybersecurity systems and how does this hurt tech sector business growth?
-
- 10 min
- Daily Mail
- 2024
Cites a study from Cambridge University that discusses potential ways in which grief bots may be exploitative. It establishes that grief bots influence you because they establish a connection through the identity and reputation of a loved one and then impact a user’s decisions. Although the article accepts that a grief bot may be therapeutic in some cases, users may be coerced into buying something by the grief bot. The grief bot can become confused with its role, for example, if a terminally ill woman leaves a grief bot for her child, the bot might depict an impending in-person encounter with the child. The third scenario in the article is one of a dying parent secretly subscribing to a grief bot service before his death, and the maintenance of the grief bot becomes intense emotional labour for the children of the deceased.
- Daily Mail
- 2024
-
- 10 min
- Daily Mail
- 2024
Think twice before using AI to digitally resurrect a dead loved one: So-called ‘griefbots’ could HAUNT you, Cambridge scientists warn
Cites a study from Cambridge University that discusses potential ways in which grief bots may be exploitative. It establishes that grief bots influence you because they establish a connection through the identity and reputation of a loved one and then impact a user’s decisions. Although the article accepts that a grief bot may be therapeutic in some cases, users may be coerced into buying something by the grief bot. The grief bot can become confused with its role, for example, if a terminally ill woman leaves a grief bot for her child, the bot might depict an impending in-person encounter with the child. The third scenario in the article is one of a dying parent secretly subscribing to a grief bot service before his death, and the maintenance of the grief bot becomes intense emotional labour for the children of the deceased.
- What are possible ways that rituals that could be used to retire grief bots?
- Should a grief bot be making any recommendations to the user? What are the potential problems or harms that could be caused by these recommendations?
-
- 7 min
- WRTV Indianapolis
- 2022
This news segment talks about cyberattacks that target high schools. The segment goes over why schools are a target, how school districts in Indiana have been attacked, and what students and parents can do to prevent attacks happening at their school.
- WRTV Indianapolis
- 2022
-
- 7 min
- WRTV Indianapolis
- 2022
Growing number of Indiana school districts victims of cyberattacks
This news segment talks about cyberattacks that target high schools. The segment goes over why schools are a target, how school districts in Indiana have been attacked, and what students and parents can do to prevent attacks happening at their school.
How does the money allocated to protecting against cyberattacks influence which school districts are targeted by these attacks? What kinds of information would be sensitive in school systems (elementary, secondary, post-secondary)? What risks do cyberattacks that specifically target schools cause and who could be harmed?
-
- TechCrunch+
- 2022
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
- TechCrunch+
- 2022
-
- TechCrunch+
- 2022
Revolut confirms cyberattack exposed personal data of tens of thousands of users
This article describes a cyberattack that leaked Revolut’s user’s data using social engineering.
Who should be responsible for protecting against cyberattacks, specifically those which involve social engineering? Other than the customers of Revolut, who is impacted by this data leak? What are the harms that this data leak could cause these customers and other stakeholders?
-
- Center for Strategic and International Studies
- 2023
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
- Center for Strategic and International Studies
- 2023
Significant Cyber Incidents
This article provides a timeline of significant cyber attacks since 2006 across the globe. It focuses on cyber attacks on government agencies, defense and high-tech companies, and economic crimes with losses of more than a million dollars.
What are the global impacts of these cyberattacks? What are the risks of the increased amount of both government and personal information online? How can cyberattacks isolated to one country have the potential to impact other nations?