hacking

× Clear Filters
28 Articles

Summary of DOJ Indictment of Iranian 2024 Election Interference

Editor’s note: Readers may also be interested in David Aaron’s analysis of the indictment. On Friday, the Department of Justice announced charges in another state-sponsored…

Analysis of Remarkable and Unremarkable Aspects of Iranian 2024 Election Interference Indictment 

What's novel and what's routine in the indictment of the three alleged Iranian government operatives.
Futuristic circuit board on a dark blue background.

Software Backdoor is a Wakeup Call for Cybersecurity

As shown by the xz backdoor, relying on luck is not a sustainable cybersecurity strategy when much of the world depends on secure software.
The episode title appears with sound waves behind it.

The Just Security Podcast: Counterterrorism and Human Rights (Part 2 Spyware and Data Collection)

This is Part 2 of a conversation with Fionnuala Ni Aoláin who recently served as UN Special Rapporteur on Human Rights and Counterterrorism.
The logo of the NSO Group is shown in black letters against a light background with a phone screen in front.

Spyware Out of the Shadows: The Need for A New International Regulatory Approach

We urgently need a system where the developers of spyware tools are forced either to require their State customers to provide credible guarantees on future human rights compliance,…
Blue futuristic monitor with information data

Poland’s Position on International Law and Cyber Operations: Sovereignty and Third-Party Countermeasures

Poland's positions push the discussion forward on contested areas of law.
A large UN meeting room.

The UN Cybercrime Treaty Has a Cybersecurity Problem In It

Proposals for an international cyber crime treaty could have unintended consequences that undermine the very purpose for its existence.
A laptop displays a message after being infected by a ransomware as part of a worldwide cyberattack on June 27, 2017 in Geldrop.

Empowering Security Researchers Will Improve Global Cybersecurity

China's response to a software vulnerability last year sparked concerns for "white hat hackers." A deep dive into the tangled regulatory world of security researchers and how improved…
Horizontal image of two hands on keyboard of a type favored by hackers, with keyboard backlit by red-orange glow.

On Ransomware, Cyber Command Should Take a Backseat

As concerns about ransomware grow, U.S. policymakers must resist temptations to over-militarize the U.S. response, instead developing cyber capabilities across a range of federal…
In an aerial view, fuel holding tanks are seen at Colonial Pipeline's Dorsey Junction Station on May 13, 2021 in Woodbine, Maryland.

It’s Time for Congress to Push Companies to Come Forward on Hacks

The United States can’t address cyber threats from sophisticated nation State actors like Russia and China if it doesn’t know about them.
FBI Building in Miami, Florida.

Hack-to-Patch by Law Enforcement Is a Dangerous Practice

Recent so-called hack-to-patch activity by law enforcement sets a dangerous precedent for the global business community. Serious security, technical, and policy drawbacks emerge…
A bus passes a large Microsoft sign and logo lit up in bright lights.

We’re From the Government, We’re Here to Help: The FBI and the Microsoft Exchange Hack

In a recent operation, the FBI removed malware from hacked Microsoft Exchange servers, and only attempted to notify the servers’ owners after the fact. This approach is almost…
1-12 of 28 items

DON'T MISS A THING. Stay up to date with Just Security curated newsletters: