Researchers reveal the ways the US election system is under threat – only one of which has anything to do with Russia.
Cyberattacks are in the top five global risks, behind extreme weather events and natural disasters. But global cooperation remains deeply problematic.
Four important elements to consider when evaluating how safe you are online.
Storing data in the cloud is convenient, but how secure is it? And what are users' options for stepping up their data security?
Flaws in manufacturing processes can cause chip flaws like Spectre and Meltdown – and blockchain technology may offer a solution.
Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.
Wasting time on the internet at work could be putting your company's cyber-security at risk.
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
Biologists' growing reliance on computers advances the field – but comes with new risks. The first step toward improved cyberbiosecurity is increasing awareness of possible threats.
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
The FBI and police officials say they need to decrypt secure communications to fight crime. But they have other options, and modern threats make clear the importance of strong encryption.
It turns out you can't ensure cyber-security in the world's fifth-largest employer if there's no one in charge of making it happen.
The US could help solve a global security problem and boost its image abroad by helping willing experts share their cybersecurity knowledge around the country and the globe.
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cybercrime affects individuals and families as they navigate online life. But significant efforts focus instead on cybersecurity, protecting institutional networks and systems – rather than people.
Scanning physical items constructed with nefarious intent can introduce malware into a smartphone or computer.
The states' handover of driver licence data for a beefed up national facial biometric matching capability would only bring existing arrangements into 'real time'.
The cyberthreat from China is one more of espionage than destruction. And it's changing – perhaps even lessening.
There are technical reasons companies can be slow to update software, but as seen in the Equifax hack, a key problem is management.