It would be no surprise if Deputy President Cyril Ramaphosa's claims of the state spying on him turn out to be true. After all, state spy agencies have been abused before in ANC factional battles.
Pacemakers are Internet of Things devices for the human body, but they're still not particularly secure.
It won't be like an army of robots marching in the streets, but AI hacking is on the horizon.
Cars are effectively becoming computers on wheels – and very attractive to cyber criminals.
Modern cars are computers on wheels. We should make sure they're cyber-secure.
The Australian government is using spyware. Is that legal?
Providing security in the blockchain would convert into a degree of predictability in the technology. If this was shown to work in the long term, it would also create trust.
A foreign policy expert takes a look at how the high-profile exchange between the U.S. and Russian leaders went down.
Born seemingly spontaneously out of a desire to create and manage shared spaces, Madrid's "citizen laboratories" are using new tools to build a new vision of how cities should be planned and run.
Did the attorney general help create a false story on why Comey was fired? Sessions' testimony to Congress provides no answers.
BCI devices that read minds and act on intentions can change lives for the better. But they could also be put to nefarious use in the not-too-distant future. Now's the time to think about risks.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
When it comes to smart vibrators, be sure to use data protection.
A way in for government would also allow hackers access.
Using sound waves to disrupt sensor functions is just one of a growing number of "side-channel attacks" that could affect our devices.
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
The latest WikiLeaks revelation shows how far the CIA can take its cyber attacks.
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.