PART SEVEN | A Post examination of cybersecurity has found that health care is among the most vulnerable industries.
PART SIX | “It might look to some people like a toy or game,” but program prepares government for digital attacks.
The Pentagon is building a virtual city that will enable government hackers to practice attacking and defending the computers and networks that increasingly run the world’s water, power and other critical systems. To reinforce the effect of those attacks, the cyber-range, known as “CyberCity,” will include a scale model of buildings and other facilities that will light up when attacks have been successful.
PART FIVE | Tools make breaking into networks almost as easy for hackers as ordering food off a menu.
PART FOUR | The greatest threat to security in the Cyber Age comes from attacks known as “social engineering.”
Hackers were able to easily breach Niagara Framework, used by more than 300,000 organizations in 52 countries to remotely control a wide array of equipment.
The Department of Homeland Security warns about security vulnerabilities in popular software that allows thousands of organizations to link up millions of devices through the Internet.
PART THREE | The Tridium company’s widely used technology is a marvel of modern connectivity, but after its networks were found to be vulnerable to hackers, it is moving to boost its security.
Niagara software has dramatically eased remote control of millions of devices, but the technology also created new vulnerabilities.
PART TWO | A new search engine called Shodan finds industrial control systems connected to cyberspace and unsettles the balance of security online.
A cyberattack on Iranian uranium-enrichment centrifuges inspired hackers, who have discovered just how accessible many of the world’s control systems are.
For global leaders to address risks in the digital universe, they must understand cyberspace.
PART ONE | To defend themselves, governments, businesses and individuals will need to decipher one of the most complex, man-made environments on Earth: cyberspace.
Explore some of the technological advances that led to cyberspace, along with notable hacks.
Consideration of software flaws and hackers is often a secondary priority for software developers, who often value sales and novel applications over security, some critics say.
A Post poll shows limited support for cybersecurity mandates, but there is no broad-based call for government to stay away, even among Republicans.
Q&A | The threat to individuals, companies and nations has grown. Read an overview of the situation.