Articles on Cybersecurity

Displaying 1 - 20 of 263 articles

Sweden is studying the possibility of an “e-krona”, an electronic form of the country’s currency. Shutterstock

Central-bank digital currencies: toward a cashless society?

With countries such as China and Sweden are studying plans to create a new form of money – a central-bank digital currency. CBDCs risk revolutionizing both the way money is created and distributed.
How secure is your password? Avi Richards/Unsplash

Passwords: security, vulnerability, constraints

Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
What’s the best way to secure a world of connected objects? Wilgengebroed

Using blockchain to secure the ‘internet of things’

More connected devices means more vulnerability to cyberattacks. Is there a cheap, easy and secure way to protect the internet and the world?
Servers hosting your favorite websites may be subject to denial-of-service attacks. Visualhunt

When the Internet goes down

The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Money is a crucial target for North Korea’s hacking efforts. rega rega/Shutterstock.com

North Korea’s growing criminal cyberthreat

North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
The Iranian Cyber Army has taken over many websites. Zone-H

Following the developing Iranian cyberthreat

Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
Bad news on the doorstep. How to stay safe? Shutterstock.

Viruses and malware: are we protecting ourselves adequately?

Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?

Top contributors

More