Scanning physical items constructed with nefarious intent can introduce malware into a smartphone or computer.
The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.
How do malware analysts examine software that's designed to wreak havoc with computers? By using tools that watch software's inner workings very closely.
Mayhem, not money, seems to be the ultimate aim of the latest attack unleashed on computer networks around the world.
It's not safe out there for an app.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
People don't want to endure the interruptions and inconveniences of keeping their computer software up to date. Research tells us why, and how we might fix the problem – and protect ourselves.
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
You know it's a serious problem when even Google and Paypal have been targeted.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
'Denial of service' cyberattacks are increasingly used to shut down websites. New research reveals that 911 call centers are vulnerable to the threat as well.
We've all called up IT for help and been asked to turn our machines off and on again. Here's why.
How can archivists properly preserve computer programs often written specifically to destroy data?
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
We are deepening our understanding of why people fall victim to the attacks in the first place.
Cyberattacks are on the rise in South Africa. New legislation is important, but it won't solve the problem if it's not accompanied by user education.
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.