Defense
Categories
The more your new automated assistant can do, the more harm it could cause.
Hacks of voting machines draw headlines, but it after votes are cast that the real vulnerability begins. Election data must be protected as it is shared with central authorities.
For decades, hackers have been able to reach across the digital divide, using cyberattacks with targets in the real world. These ‘kinetic cyber’ attacks are increasing in sophistication and severity.
Malware has evolved in the past three decades. The sophistication, scope, and volume of threats has increased so significantly that anti-malware software struggles to keep up. Here we look at the evolution of malware since it first appeared in 1986 to its astounding growth in 2020.