Cyber

× Clear Filters
357 Articles
A man walks inside the Apple store in Hong Kong on October 10, 2019.

App Stores as Back-Doors for Government Regulation of End-to-End Encryption

App stores make natural chokepoints for de facto government regulation, without the long and politically expensive process of legislation. But the privacy and security implications…
Putin

Prepare for the Worst and Fight for the Best: A Citizen’s Guide to 2020 Electoral Interference

"Keeping in mind that one of the most effective ways to neutralize covert activity is to expose it, we hope that assessing Russia’s potential next moves will empower the electorate,…
Iran flag and computer keyboard

Iran Joins Discussions of Sovereignty and Non-Intervention in Cyberspace

"This most recent statement by Iran’s General Staff appears to represent a rather sharp departure from the country’s previous position vis-à-vis the applicability of general…
An engineer-virologist looks at 24 well plates adherent cells monolayer infected with a Sars-CoV-2 virus.

The Second Oxford Statement on International Law Protections of the Healthcare Sector During Covid-19: Safeguarding Vaccine Research

International lawyers who wish to append their name to the Statement should send an email to ...
Shattered glass with national flag and padlock icon

Canada’s Scattered and Uncoordinated Cyber Foreign Policy: A Call for Clarity

"Articulating Canada’s first principles in the context of cyberspace would help clarify what Canadian interests are, and what they mean, in a digitalized world. Only after defining…
People sit and work at large metal desks at U.S. Army Cyber Command headquarters

Cyberattack Attribution and International Law

Earlier this week, the U.S. Department of Justice unsealed an indictment accusing two men linked to China’s Ministry of State Security of a decade-long campaign of hacking dissidents,…
Aerial view of people in white and red to form the Canadian flag.

A Deep Dive into Canada’s Overhaul of Its Foreign Intelligence and Cybersecurity Laws

Following the release of documents by Edward Snowden, many of the Western governments whose agencies’ activities were implicated in the leaks raced to update and modernize their…
A doctor speaks with a patient during an online consultation session at a hospital in Shenyang in China's northeastern Liaoning province on February 4, 2020.

Oxford Statement on the International Law Protections Against Cyber Operations Targeting the Health Care Sector

In advance of Friday, May 22 Arria-Formula meeting of the United Nations Security Council.
Fictitious malicious coding in a 1970 dot matrix font on a computer screen.

What the Pandemic Tells Us About the State of U.S. Cybersecurity

The Cyberspace Solarium Commission sees lessons on risk assessment, resilience, public-private collaboration, and more.
Associate Professor Carol Dysinger, right, of New York Universitys Tisch School of the Arts conducts her weekly remote learning class for the graduate schools filmmaking students April 9, 2020 at her apartment in the Brooklyn borough of New York City.

Zoom and the Problem of Cybersecurity Moral Hazard

When companies are insulated from paying the full costs associated with the use of their products, the problem of moral hazard can arise.

WhatsApp v. NSO Group: State Immunity and Cyber Spying

WhatsApp claims NSO implanted spyware on phones of human rights activists, lawyers, and religious figures. NSO says it can't be sued if it did so on behalf of (undisclosed) foreign…
An AFP journalist views an example of a "deepfake" video manipulated using artificial intelligence.

Deepfakes 2.0: The New Era of “Truth Decay”

The first generation (Deepfakes 1.0) was largely used for entertainment purposes. The next generation (Deepfakes 2.0) is far more convincing and readily available.
1-12 of 357 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: