Skip to content
The federal government wants you to adopt ‘end-to-end encryption’ methods. Here’s why you should adopt them
A person typing on their smartphone.

Science & TechnologyArticle

The federal government wants you to adopt ‘end-to-end encryption’ methods. Here’s why you should adopt them

Northeastern doctoral student studying cybersecurity and wireless networks awarded prestigious Google Fellowship
PhD student Evangelos Bitsikas working in a lab.

Science & TechnologyArticle

Northeastern doctoral student studying cybersecurity and wireless networks awarded prestigious Google Fellowship

What caused pagers used by Hezbollah to explode? Northeastern wireless security expert explains what might have happened 
Lebanese army soldiers standing in the street while an ambulance drives by.

World NewsArticle

What caused pagers used by Hezbollah to explode? Northeastern wireless security expert explains what might have happened 

Why are medical providers still struggling to get paid seven months after the Change Healthcare’s cyberattack?
Close-up of a person's hands typing on a keyboard in a dimly lit room.

Science & TechnologyArticle

Why are medical providers still struggling to get paid seven months after the Change Healthcare’s cyberattack?

Wireless gear shifting systems on bikes can be hacked. Northeastern cybersecurity experts identify the problem and offer solutions
A time lapsed blurred photo of a person riding a bike.

Science & TechnologyArticle

Wireless gear shifting systems on bikes can be hacked. Northeastern cybersecurity experts identify the problem and offer solutions

Foreign actors could sow ‘chaos’ in the 2024 presidential election, cybersecurity expert says

World NewsArticle

Foreign actors could sow ‘chaos’ in the 2024 presidential election, cybersecurity expert says

Cyberattack on major health-tech company was caused by weak security infrastructure, Northeastern cybersecurity experts say
A sign outside of a UnitedHealth Group building.

Science & TechnologyArticle

Cyberattack on major health-tech company was caused by weak security infrastructure, Northeastern cybersecurity experts say

How secure is your security camera? Hackers can spy on cameras through walls, new research finds
A security camera on a table.

Science & TechnologyArticle

How secure is your security camera? Hackers can spy on cameras through walls, new research finds

Cybersecurity experts explain how a British tabloid company may have hacked Prince Harry’s phone
Prince Harry waving while leaving the High Court.

World NewsArticle

Cybersecurity experts explain how a British tabloid company may have hacked Prince Harry’s phone

Apple AirTags can track lost suitcase, but slow to alert for stalking, researchers say
Aanjhan Ranganathan sitting in a chair talking with two students about AirTag research.

Science & TechnologyArticle

Apple AirTags can track lost suitcase, but slow to alert for stalking, researchers say

Your photos can hear you. AI and machine learning help researchers get audio from still images and silent videos

Science & TechnologyArticle

Your photos can hear you. AI and machine learning help researchers get audio from still images and silent videos

New smartphone vulnerability discovered by Northeastern Ph.D. student reveals hackers could track your location
person holding a smartphone

Science & TechnologyArticle

New smartphone vulnerability discovered by Northeastern Ph.D. student reveals hackers could track your location