How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
Phishing for information and money.
You know it's a serious problem when even Google and Paypal have been targeted.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
When calling these people, you want to be able to get through.
Fairfax County, Virginia
'Denial of service' cyberattacks are increasingly used to shut down websites. New research reveals that 911 call centers are vulnerable to the threat as well.
We've all called up IT for help and been asked to turn our machines off and on again. Here's why.
Hex code from the Blaster worm reveals the potential motivations of the worm’s creator.
How can archivists properly preserve computer programs often written specifically to destroy data?
Try to make this the only time you see a ransomware warning notice.
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
Criminals who hide their computers shouldn’t go free.
Computer criminal via shutterstock.com
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
Gah! What did I just do?!?!
Image of hands and computer via shutterstock.com
We are deepening our understanding of why people fall victim to the attacks in the first place.
Cybercriminals take advantage of computer users’ lack of education about their methods.
Cyberattacks are on the rise in South Africa. New legislation is important, but it won't solve the problem if it's not accompanied by user education.
Do not adjust your set.
Museum of Malware
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.
What would you do if your files were locked away?
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
A widespread and virulent ransomware, Angler, is de-fanged by having the world's most widely-used networking equipment ignore it
Apple’s ‘walled garden’ might be frustrating, but it does protect your devices from being hacked.
Jailbreaking your iOS device can free you from Apple's 'walled garden', but it's a Wild West beyond the walls.
Rombertik takes the nuclear option rather than be found.
National Nuclear Security Administration
Rombertik malware will happily take the nuclear option on your hard drive.
When malware stops looking like malware, we’re in for a tough ride.
patterns by cepera/shutterstock.com
Recognising malware patterns is key to the effectiveness of antivirus programs.
We need to take charge and teach ourselves a bit about the internet in order to stay safe online.
There is only so much government and business can do to keep us safe online. Ultimately we need to take personal responsibility for how we use the internet.
Who’s looking after your keys?
PC box shifter Lenovo's public whipping for serving up malware in its default installs should be a lesson to all.
Picking off hard drive manufacturers, one by one.
Mystery malware capable of hiding itself in a hard drives' internal electronics has been revealed, having spread worldwide for more than a decade.
Did they get any Jennifer Lawrence pics?
The recent cyber attack on Sony Pictures was so extensive there were notices placed on the entrance doors telling staff not to log in to the company’s network when they reached their desks. Sony’s entire…