Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
Which hat would you wear?
The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.
Cybersecurity jargon can be intimidating, but it needn’t be.
To protect ourselves online, we should all understand a few key terms.
It’s software: There’s always a way in.
BeeBright via shutterstock.com
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
‘No, I absolutely do not wish to change my password, thanks.’
If security advice from government agencies doesn't ring true, customers won't take it – which puts us all at risk.
Looking deep into computer activities.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of 'hacker ethics' values such as privacy and free speech.
How secure are you?
As gig work transitions online, knowing how to protect yourself and your devices has never been more important.
If only it were this easy.
'Keyboard' via shutterstock.com
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
Russia is pressing its national interests online.
Flags and keyboard via shutterstock.com
The FBI is warning of Russian cyberattackers probing American election systems. Information warfare scholars discuss Russia's digital efforts to benefit its national interests.
Seeking a peaceful handover of power between parties and political opponents.
It's true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
Are online black markets this direct?
Hands exchanging money via shutterstock.com
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Your mobile number is all a hacker needs to read your texts, listen to your calls and even track your whereabouts.
Online activism now means creating alternative ways to work, communicate and protest.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
What would you do if your files were locked away?
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
2015 saw us complete our exploration of all nine planets (including dwarf planet Pluto) in our solar system.
2015 was a year where we expanded our view of the universe, embraced new technologies and got a hint of the profound changes to come.
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.