Skip to main content
Menu
Hub
Open Hub
About the Hub
Announcements
For Media
Faculty Experts Guide
Subscribe to the newsletter
Explore by Topic
Arts+Culture
Athletics
Health
Politics+Society
Science+Technology
Student Life
University News
Voices+Opinion
Events
At Work
Open At Work
About Hub at Work
Gazette Archive
Explore by Topic
News+Info
Benefits+Perks
Health+Well-Being
Tools+Tech
Happenings
Johns Hopkins Magazine
Open Johns Hopkins Magazine
Current issue
About the Magazine
Past Issues
Contact
Support Johns Hopkins Magazine
Subscribe to the Magazine
jhu.edu
Search
Archived articles
Cybersecurity
Digital risk management
Published
Sept 30, 2014
JHU to co-host two-day cybersecurity conference
iCloud caution
'Be aware of what you're putting on your phone'
Published
Sept 3, 2014
Release of revealing celebrity photos shows we are all vulnerable, JHU internet security expert says
/ NPR
Scanner security flaws
Published
Aug 20, 2014
Researchers find security vulnerabilities in X-ray scanners used in U.S. airports
Cybersecurity
'Next-level' encryption
Published
Aug 8, 2014
Johns Hopkins at forefront of new push to make computer programs hack-proof
Code red?
What is Heartbleed?
Published
April 10, 2014
JHU cryptography expert Matthew Green speaks with
The New York Times
about encryption software flaw
iSpy?
Is your laptop spying on you?
Published
Dec 23, 2013
How MacBook webcams can be used to watch you without your permission
/ The Washington Post
On the hill
Is your data secure?
Published
Nov 19, 2013
Computer science professor Avi Rubin testifies before House subcommittee about healthcare.gov security
Previous