Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
The international community – and the U.S. and China in particular – should give serious thought to what might be North Korea's cyberattack equivalent of a nuclear weapons test.
Where people get advice about online safety may affect how safe they are.
New standards and regulations are beginning to govern how companies protect customers' data. Companies ignore this vital issue at their peril, both financially and legally.
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
As searches of smartphones and other digital devices at US borders become more common, can research and computer science help protect travelers' privacy?
It may sound like science fiction, but research shows that all you really need to develop brain biometrics is a set of earphones.
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.
Russia could undermine the idea of a shared European reality and sway three elections key to the future of the bloc.
The power grid is increasingly computerized. That opens it to attacks and requires new defenses.
Most of today's computer languages make it hard for programmers to protect users' privacy and security. The fix is to take those tasks out of human hands entirely.
Recent developments at the United Nations and the G-20 suggest that the well-known human rights to privacy and freedom of expression may soon be formally extended to online communications.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
Governments, academic institutions and private companies are all spending millions of dollars. But the most effective solutions to the cybersecurity labor shortage will not be found individually.
The best way to protect a presidential device is to keep it off the internet altogether. If that's not going to happen, how else can such a sensitive gadget be kept safe?
Dulled by hearing the same old recommendations to improve internet security, we are worn out. It's time for a new approach, involving us all.
Government agencies and contractors are now less trusting of their workers, and keeping a much closer eye on them, both on and off the job.
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
Cyber threats are universal. But the appropriate response may be quite different in academia from what works in the corporate world.