States like California have been at the forefront of privacy innovation in recent decades. A possible federal law could bring their experimentation to a halt, harming consumers.
Society needs cybersecurity professionals who can protect systems and mitigate damage.
Hip-hop artists in Nigeria unpack the realities of the country's cyber fraudsters.
The latest malware is designed especially to make small companies pay through the nose for their data.
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
We found hundreds of local council workers willing to give out login details for government systems without realising.
Bitcoin and other digital currencies have been running wild in recent years, soaring and then plunging in value. A few stories from The Conversation's archive offer a glimpse into their world.
When victims report cybercrime they want an offender arrested and prosecuted, but a report finds that rarely happens.
In reality, cybersecurity attacks are like a disease affecting people globally.
Trust is the keystone of the entire Internet system: without it more connection and therefore more commerce. How to restore it?
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Kenya’s new Computer and Cyber Crime Act must not be abused by the criminal justice system.
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Lotto scamming — a criminal enterprise largely targeting elderly Americans — is lucrative in western Jamaica, where it is thought to be behind 50 percent of all area murders last year.
Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.
Allegations bring to the fore questions over the legitimacy of bitcoin – a sound investment tool or a massive scam?
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
The rate at which valuable identity information is flying out of the control of firms is alarming -- more than 3,500 records per minute.
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cybercrime affects individuals and families as they navigate online life. But significant efforts focus instead on cybersecurity, protecting institutional networks and systems – rather than people.