As Amazon introduces a new smart-home device aimed at children, it's important to know many internet-connected toys are not secure, putting kids' security and privacy at risk.
Here's how to secure your home network, whether or not it has already been attacked by hackers.
Local governments don't pay much attention to cybersecurity, leaving them vulnerable to hijacking as happened to Atlanta and Baltimore.
In a complex environment with massive numbers of internet-connected devices, the key barrier to better cybersecurity isn't funding: It's ensuring staff at all levels take action against the threat.
With countries such as China and Sweden are studying plans to create a new form of money – a central-bank digital currency. CBDCs risk revolutionizing both the way money is created and distributed.
The best way to protect elections is to plan and prepare for an audit of the results after the votes are cast.
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
Theresa May says Britain could unleash 'extensive measures' against Russia following the nerve agent poisoning of ex-spy Sergei Skripal.
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
More connected devices means more vulnerability to cyberattacks. Is there a cheap, easy and secure way to protect the internet and the world?
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Smartphones are key elements of two-factor authentication processes. Weakening their security threatens people's digital identities.
An ultra-safe industry has important experience that could help a vulnerable new industry improve its safety.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Researchers reveal the ways the US election system is under threat – only one of which has anything to do with Russia.
Cyberattacks are in the top five global risks, behind extreme weather events and natural disasters. But global cooperation remains deeply problematic.
Four important elements to consider when evaluating how safe you are online.
Storing data in the cloud is convenient, but how secure is it? And what are users' options for stepping up their data security?
Flaws in manufacturing processes can cause chip flaws like Spectre and Meltdown – and blockchain technology may offer a solution.
Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.