Cyberattacks
Intro -- Cover -- Title -- Copyright -- Contents -- Introduction -- Section 1: The Age of Cyberwar -- 1.1 AI-Influenced Weapons Need Better Regulation -- 1.2 Are We Ready for the Future of Warfare? -- 1.3 Fully Autonomous Weapons Pose Unique Dangers to Humankind -- 1.4 Here's How to End the Fog of Cyber War -- 1.5 Here's What a Cyber Warfare Arsenal Might Look Like -- Section 2: Infrastructure Under Attack -- 2.1 Hacker Attack on Essential Pipeline Shows Infrastructure Weaknesses -- 2.2 How Hackers Tried to Add Dangerous Lye into a City's Water Supply -- 2.3 Is the Power Grid Getting More Vulnerable to Cyber Attacks? -- 2.4 The Most Vulnerable Ransomware Targets Are the Institutions We Rely On Most -- 2.5 U.S. Hospitals Not Immune to Crippling Cyber Attacks -- 2.6 Urban Bungle: Atlanta Cyber Attack Puts Other Cities on Notice -- 2.7 What Do Hurricanes and Cybersecurity Have in Common? -- Section 3: Big Data In the Wrong Hands -- 3.1 Blockchain Enhances Privacy, Security and Conveyance of Data -- 3.2 Data Thieves Find Easy Pickings in the Health Care System -- 3.3 Data Vu: Why Breaches Involve the Same Stories Again and Again -- 3.4 Giant U.S. Computer Security Breach Exploited Very Common Software -- 3.5 The Equifax Hack-Bad for Them, Worse for Us -- Section 4: Are Our Elections Vulnerable? -- 4.1 Are Blockchains the Answer for Secure Elections? Probably Not -- 4.2 How to Defraud Democracy -- 4.3 The Vulnerabilities of Our Voting Machines -- Section 5: White Hats vs. Black Hats -- 5.1 CSI: Cyber-Attack Scene Investigation: a Malware Whodunit -- 5.2 FBI Takes Down Hive Criminal Ransomware Group -- 5.3 Hacking the Ransomware Problem -- 5.4 The Imperfect Crime: How the WannaCry Hackers Could Get Nabbed -- 5.5 Women in Cybersecurity: Where We Are and Where We're Going -- Section 6: Protecting Your Privacy.