How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
At CIA headquarters on Jan. 17, Trump said the ‘dishonest media’ made it appear he was having a feud with the intel community.
Olivier Douliery/AP via CNP
The president, the press and the public have misguided ideas about how intelligence is produced and analyzed. A Georgetown professor sets us straight.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Do not adjust your set.
Museum of Malware
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.
An out of date operating system can let the hackers in to your computer network.
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
Doing something about online security would be best. But talking about it is a good start.
Will the US-China relationship devolve into Spy vs Spy?
The protection of trade secrets is an area of concern for both countries and is more likely to lead to an agreement.
Anti-virus software can keep cyber-criminals at bay.
Throwing a safety net over one's computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
The internet of things – including the equipment on the power grid – is increasing cybersecurity risks for all critical infrastructure.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Claims that a cybersecurity expert hacked an aeroplane's cockpit might not be as unbelievable as they first seem.
There's no excuse for big firms letting basic attacks compromise their customers' data.
These days anyone can download the tools used for cyber crime.
Ivan David Gomez Arce/Flickr
Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
We all need to clean up our online acts.
Intel Free Press
No matter how strong an organization's cybersecurity, our own bad behavior could make us the "unintentional insiders" for the next big hack.
Oops, did I click something dangerous?
Cybersecurity is only as strong as the people behind the computer. And we often don't understand the risks when we click a link.
Hacking can, and should, keep us on our toes.
The world is already short of computer security experts, but by 2017 that shortfall is going to have reached about two million. Criminal hackers cause damage running to billions of pounds every year…
Is it a crime scene or just a store checkout? Could be both.
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
Internet Riot Police.
If cyber-crime is the tier one (most serious) threat that we are told it is, and we are experiencing upwards of 2-3 million cyber-threats each year, then why have we only had 350 or so prosecutions under…
We should know by now - don’t click that link.
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is…