Cyber Crime (26)

Use of digital resources to support criminal acts and/or terrorism

View options:

Find narratives by ethical themes or by technologies.

FILTERreset filters
Themes
  • Privacy
  • Accountability
  • Transparency and Explainability
  • Human Control of Technology
  • Professional Responsibility
  • Promotion of Human Values
  • Fairness and Non-discrimination
Show more themes
Technologies
  • AI
  • Big Data
  • Bioinformatics
  • Blockchain
  • Immersive Technology
Show more technologies
Additional Filters:
  • Media Type
  • Availability
  • Year
    • 1916 - 1966
    • 1968 - 2018
    • 2019 - 2069
  • Duration
  • 7 min
  • Wall Street Journal
  • 2019
image description
U.S. Companies Learn to Defend Themselves in Cyberspace

Large firms in the United States are becoming far more resilient to cyber attacks, primarily through larger spending and higher prioritization of security. This is especially important as digital hacking escalates conflicts between global nations.

  • Wall Street Journal
  • 2019
  • 3 min
  • CNET
  • 2019
image description
Thanks to Equifax breach, 4 US agencies don’t properly verify your data, GAO finds

US Government agencies rely on outdated verification methods, increasing the risk of identify theft.

  • CNET
  • 2019
  • 5 min
  • Wired
  • 2019
image description
How Facial Recognition is fighting child sex trafficking

Non-profit companies such as Thorn and the Canadian Centre for Child Protection are using existing software, particularly facial recognition algorithms, to discover ways to become more proactive in fighting child pornography and human trafficking on the dark web.

  • Wired
  • 2019
  • 7 min
  • MIT Technology Review
  • 2019
image description
Hackers Are the Real Obstacle for Self-Driving Vehicles

Autonomous vehicles could be subject to hacks by adversarial machine-learning, possibly perpetrated by out-of-work truck/Uber drivers and “adversarial machine learning”. The fact that vehicle algorithms can already be fairly easily tricked also raises concerns.

  • MIT Technology Review
  • 2019
  • 5 min
  • MIT Technology Review
  • 2019
image description
Five reasons “hacking back” is a recipe for cybersecurity chaos

Discusses the issues that come with allowing private companies to fight back against cyber attacks by chasing hackers across the internet, including greater conflict with other countries and potential lawsuits.

  • MIT Technology Review
  • 2019
  • 5 min
  • The New York Times
  • 2019
image description
Hackers Holding Baltimore Hostage

As the case study of Baltimore demonstrates, cyber crime against governments for ransom of digital cash is not an uncommon practice.

  • The New York Times
  • 2019
Load more