As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
We've no way of knowing if allegations that China implanted secret spying microchips in widely used computers are true.
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
BA's handling of the latest corporate cyber attack shows a catalogue of missed opportunities.
Researchers used a fax machine that wasn't even connected to the internet to break into a computer network.
A serious security threat was found in popular video game Fortnite's installation method after it bypassed Google's official app store.
Australia has one of the most secure electoral systems imaginable thanks to paper ballots. Cybersecurity experts caution against e-voting.
Malicious and criminal attacks were the cause of 59% of data breaches in the last three months, according the latest reported figures.
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Cybersecurity is an increasingly relevant concern in our society, but pop culture tells us virtually nothing useful about it.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
Data breaches are fact of modern life. It's likely each of us will have our personal information compromised at some point. Here's how to reduce the risk and limit the damage if and when it occurs.
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Kenya’s new Computer and Cyber Crime Act must not be abused by the criminal justice system.
Google and Facebook reign supreme over digital advertising. Yet the Cambridge Analytica scandal, and when the effectiveness of this advertising seems limited, should we ban this model?
Where does responsibility lie if a person acts under the influence of their brain implant? As neurotechnologies advance, a neuroethicist and a legal expert write that now's the time to hash it out.
Do you think you’ve set up your Facebook account so that only your friends can see your information? Think again…
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.