The deep and dark web can be a scary place, but modern open-source technologies funded by the Defense Department can help explore it.
The biggest cyber security concern for many Tanzanians is the risk of inadvertently becoming a perpetrator of politically-defined cybercrime, rather than becoming a victim
LinkedIn, MySpace, Yahoo: Why does it take such a long time for companies to disclose that they have been hacked?
By 2020, the cybersecurity industry will need 1.5 million more workers than will be qualified for jobs. What's the solution? Getting high school and college students excited about the industry.
Telling girls and young women to 'be careful what images you share' contributes to the shaming and humiliation of victims by placing the responsibility back onto them for their own humiliation.
As governments look to new ways to step up surveillance, hackers find new ways to subvert it. Is there a way to end this cat and mouse game, described as a crypto-war?
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
Imagining possible futures can help us plan a secure information technology environment for the years to come.
Australia has some way to travel before it graduates to a coherent national cyber security strategy.
The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
Cyber security is now a priority for the government, with $230 million committed to its new Cyber Security Strategy. But is it enough?
It's bad enough when someone loses money to an online scam. But some victims can also recruit others into the scam causing even further heartache and loss of money.
Cyberattacks are on the rise in South Africa. New legislation is important, but it won't solve the problem if it's not accompanied by user education.
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
2015 was a year where we expanded our view of the universe, embraced new technologies and got a hint of the profound changes to come.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
UK plc has a cybersecurity mountain to climb.
Strange calls, emails, or disappearing bank balances – how online criminals use stolen card details.
An increase in the crime figures doesn't necessarily mean an increase in crime.