Does the Internet bring people together or isolate them?
Trust is the keystone of the entire Internet system: without it more connection and therefore more commerce. How to restore it?
Distributed Denial of Service (DDoS) attacks are up 16% in the last year.
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
A new act is trying to lock down cyber crime in Kenya.
Kenya’s new Computer and Cyber Crime Act must not be abused by the criminal justice system.
Servers hosting your favorite websites may be subject to denial-of-service attacks.
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Jamaica’s lotto scammers have gotten rich tricking American seniors and gamblers into thinking they’ve won the lotto, then demanding a modest ‘processing fee.’
Lotto scamming — a criminal enterprise largely targeting elderly Americans — is lucrative in western Jamaica, where it is thought to be behind 50 percent of all area murders last year.
Brett Johnson tears up when he mentions the FBI special agent who helped him quit online fraud.
Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.
Alexander Vinnik (right), suspected of running a money laundering operation using bitcoin, denies all charges against him.
Allegations bring to the fore questions over the legitimacy of bitcoin – a sound investment tool or a massive scam?
The Iranian Cyber Army has taken over many websites.
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
We want your data.
gualtiero boffi / Shutterstock.com
The rate at which valuable identity information is flying out of the control of firms is alarming -- more than 3,500 records per minute.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Confidence scams carried out online are still rampant.
R. Stevens/CREST Research
Cybercrime affects individuals and families as they navigate online life. But significant efforts focus instead on cybersecurity, protecting institutional networks and systems – rather than people.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
Can criminals use cryptocurrency to hide their identities and activities?
As cryptocurrency systems improve, they will better protect criminals' identities and even allow people to offer anonymous rewards for crimes they want committed.
More cryptocurrencies appear all the time.
Cybercriminals increasingly depend on e-currencies to profit from their misdeeds. They, and their potential victims, could be driving some of the growth in cryptocurrency markets.
Are Australian police doing enough with the data they have?
Many Australians are unaware of current police and intelligence powers when it comes to accessing our data.
Police operations online sometimes have shaky legal grounds.
U.S. Justice Department/Handout via REUTERS
Without proper checks, police could have significantly expanded scope to search homes and computers around the world.
Anxieties about hoodlums in cars was just another expression of an age-old fear of change.
Australian police often have to request data about suspects from overseas.
AAP Image/Australian Federal Police
Support from overseas law enforcement and tech companies is typically a slow and cumbersome process.
Cars are effectively becoming computers on wheels – and very attractive to cyber criminals.
Who’s inside the hoodie?
The Russian cyberthreat goes back over three decades, extends into the country's educational systems and criminal worlds, and shows no signs of letting up.