A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
Research shows we're pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Treating non-violent cyber attacks as warfare could lead to unnecessary escalation.
Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There's less attention to the dangers of cyberattacks, which could cripple key utilities.
The worst-case scenario is that hackers still have access to the university systems via a backdoor and are siphoning off critical data as it emerges.
Cyber attacks are becoming part of traditional warfare, but who should be targeted in response and what force should be used?
The very first cyberattack clogged up the nascent internet, halting digital communications. Now much bigger, the internet is still largely open to – and suffering regularly from – similar attacks.
As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
Researchers used a fax machine that wasn't even connected to the internet to break into a computer network.
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
All the cyber threats that fans and footballers face at the World Cup...and tips for remaining safe.
World Water Day shines a light on the importance of safe, clean drinking water, but a new report finds Canada's freshwater systems are under stress.
More connected devices means more vulnerability to cyberattacks. Is there a cheap, easy and secure way to protect the internet and the world?
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Biologists' growing reliance on computers advances the field – but comes with new risks. The first step toward improved cyberbiosecurity is increasing awareness of possible threats.