With countries such as China and Sweden are studying plans to create a new form of money – a central-bank digital currency. CBDCs risk revolutionizing both the way money is created and distributed.
The best way to protect elections is to plan and prepare for an audit of the results after the votes are cast.
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
Theresa May says Britain could unleash 'extensive measures' against Russia following the nerve agent poisoning of ex-spy Sergei Skripal.
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
More connected devices means more vulnerability to cyberattacks. Is there a cheap, easy and secure way to protect the internet and the world?
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Smartphones are key elements of two-factor authentication processes. Weakening their security threatens people's digital identities.
An ultra-safe industry has important experience that could help a vulnerable new industry improve its safety.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Researchers reveal the ways the US election system is under threat – only one of which has anything to do with Russia.
Cyberattacks are in the top five global risks, behind extreme weather events and natural disasters. But global cooperation remains deeply problematic.
Four important elements to consider when evaluating how safe you are online.
Storing data in the cloud is convenient, but how secure is it? And what are users' options for stepping up their data security?
Flaws in manufacturing processes can cause chip flaws like Spectre and Meltdown – and blockchain technology may offer a solution.
Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.
Wasting time on the internet at work could be putting your company's cyber-security at risk.
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
Biologists' growing reliance on computers advances the field – but comes with new risks. The first step toward improved cyberbiosecurity is increasing awareness of possible threats.
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?