Looking deep into computer activities.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of 'hacker ethics' values such as privacy and free speech.
How secure are you?
As gig work transitions online, knowing how to protect yourself and your devices has never been more important.
If only it were this easy.
'Keyboard' via shutterstock.com
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
Russia is pressing its national interests online.
Flags and keyboard via shutterstock.com
The FBI is warning of Russian cyberattackers probing American election systems. Information warfare scholars discuss Russia's digital efforts to benefit its national interests.
Seeking a peaceful handover of power between parties and political opponents.
It's true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
Are online black markets this direct?
Hands exchanging money via shutterstock.com
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Your mobile number is all a hacker needs to read your texts, listen to your calls and even track your whereabouts.
Online activism now means creating alternative ways to work, communicate and protest.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
What would you do if your files were locked away?
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
2015 saw us complete our exploration of all nine planets (including dwarf planet Pluto) in our solar system.
2015 was a year where we expanded our view of the universe, embraced new technologies and got a hint of the profound changes to come.
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
UK plc has a cybersecurity mountain to climb.
A widespread and virulent ransomware, Angler, is de-fanged by having the world's most widely-used networking equipment ignore it
Which operating system is safer from a hack attack?
The argument has been raging for years: which operating system is the safest when it comes to security. Has the latest software upgrades from the tech giants changed anything?
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are.
If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
The divide between 'legal' and illegal hacking is very, very thin.
Why did Penn State take so long to disclose the breach?
Laptop image via www.shutterstock.com
The recent cyber attacks at Penn State have put personal information of 18,000 students in the hands of hackers. What should universities do to protect students' privacy?