Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
U.S. President Donald Trump has taught the world many lessons since his time in office – mostly on how not to govern.
(AP Photo/Carolyn Kaster)
Love him or hate him, Donald Trump has shown us a great deal in his short time on the political stage. For that, we should be grateful. Here are the lessons taught by Prof. Trump.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
South African Deputy President Cyril Ramaphosa claims the country’s security agencies hacked his emails.
It would be no surprise if Deputy President Cyril Ramaphosa's claims of the state spying on him turn out to be true. After all, state spy agencies have been abused before in ANC factional battles.
Embedded medical devices will continue to be vulnerable to cybersecurity threats. The pacemaker depicted is not made by Abbott’s.
Pacemakers are Internet of Things devices for the human body, but they're still not particularly secure.
Hackers will start to get help from robots and artificial intelligence soon.
It won't be like an army of robots marching in the streets, but AI hacking is on the horizon.
Cars are effectively becoming computers on wheels – and very attractive to cyber criminals.
Cars are basically computers on wheels. That means they can be hacked.
Modern cars are computers on wheels. We should make sure they're cyber-secure.
Australian government agencies are employing the services of spyware company Cellebrite.
The Australian government is using spyware. Is that legal?
Voice authentication technology could be used to increase blockchain security.
Merrill College of Journalism/flickr
Providing security in the blockchain would convert into a degree of predictability in the technology. If this was shown to work in the long term, it would also create trust.
President Donald Trump shakes hands with Russian President Vladimir Putin at the G20 Summit
AP Photo/Evan Vucci
A foreign policy expert takes a look at how the high-profile exchange between the U.S. and Russian leaders went down.
Neighbours enjoy Madrid’s outdoor Cinema Usera.
Todo por la Praxis
Born seemingly spontaneously out of a desire to create and manage shared spaces, Madrid's "citizen laboratories" are using new tools to build a new vision of how cities should be planned and run.
Attorney General Jeff Sessions testifies before the Senate Intelligence Committee hearing.
AP Photo/Alex Brandon
Did the attorney general help create a false story on why Comey was fired? Sessions' testimony to Congress provides no answers.
A subject plays a computer game as part of a neural security experiment at the University of Washington.
BCI devices that read minds and act on intentions can change lives for the better. But they could also be put to nefarious use in the not-too-distant future. Now's the time to think about risks.
It’s software: There’s always a way in.
BeeBright via shutterstock.com
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
How’s this setting?
When it comes to smart vibrators, be sure to use data protection.
A way in for government would also allow hackers access.
Using sound waves to disrupt sensor functions is just one of a growing number of "side-channel attacks" that could affect our devices.
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?