"If you think that hackers are just a bunch of anarchists ready to put everything on fire because it amuses them, you are wrong at all: we are much worse than that". (No One Is Innocent)
Numerous cyber attacks in recent years have targeted common household devices, such as routers.
A vigilant public is a necessary component in our collective security strategy against cyber attacks.
Hackers can interfere with everyday efforts to keep the lights on.
It's easier to see how customers benefit from increased grid security than it is to justify making them pay for it.
On the road again…
Digital nomadism and van life lie at the heart of today’s work aesthetics. These trends may create liminal experiences within job markets
We want your data.
gualtiero boffi / Shutterstock.com
The rate at which valuable identity information is flying out of the control of firms is alarming -- more than 3,500 records per minute.
Bad news on the doorstep. How to stay safe?
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
The public disclosures Uber has made so far make it very difficult to identify Australians caught up in the data breach.
Uber has admitted that the 2016 data breach puts at risk the personal information of 57 million users.
Some Peace Corps volunteers already provide computer assistance and instruction.
The US could help solve a global security problem and boost its image abroad by helping willing experts share their cybersecurity knowledge around the country and the globe.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
Which hat would you wear?
The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.
Cybersecurity jargon can be intimidating, but it needn’t be.
To protect ourselves online, we should all understand a few key terms.
It’s software: There’s always a way in.
BeeBright via shutterstock.com
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
‘No, I absolutely do not wish to change my password, thanks.’
If security advice from government agencies doesn't ring true, customers won't take it – which puts us all at risk.
Vladimir Putin, here with French President Francois Hollande, has big plans for Europe.
Kremlin Press Office
The Kremlin wants to build strong alliances with "pro-Russian" forces in the West. In France's upcoming election, Putin is placing his bets on two right-wing candidates for president.
Looking deep into computer activities.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of 'hacker ethics' values such as privacy and free speech.
How secure are you?
As gig work transitions online, knowing how to protect yourself and your devices has never been more important.