Latest blog articles
-
“The SolarWinds Attack is, to date, the most visible, widespread, and intrusive information technology (‘IT’) software supply chain attack – i.e., a cyber attack that corrupts IT software and uses that software as an attack vector. Supply chain attacks are dangerous because the malware is embedded...
-
Plant varieties are difficult to make but easy to reproduce. Proving that someone reproduced a plant variety, however, is extremely hard. For organized crime, infringing plant variety rights therefore presents low-hanging fruit, with consequences far beyond the infringement of IP rights.
-
In January Dr. Jessica Alleva, from the Department of Clinical Psychological Science at the Faculty of Psychology and Neuroscience, was honoured twice for her work on improving body image. She received the 2016 Seymour Fisher Outstanding Body Image Dissertation Award and the Distinguished Women...