Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.
Wasting time on the internet at work could be putting your company's cyber-security at risk.
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
Biologists' growing reliance on computers advances the field – but comes with new risks. The first step toward improved cyberbiosecurity is increasing awareness of possible threats.
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
The FBI and police officials say they need to decrypt secure communications to fight crime. But they have other options, and modern threats make clear the importance of strong encryption.
It turns out you can't ensure cyber-security in the world's fifth-largest employer if there's no one in charge of making it happen.
The US could help solve a global security problem and boost its image abroad by helping willing experts share their cybersecurity knowledge around the country and the globe.
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cybercrime affects individuals and families as they navigate online life. But significant efforts focus instead on cybersecurity, protecting institutional networks and systems – rather than people.
Scanning physical items constructed with nefarious intent can introduce malware into a smartphone or computer.
The states' handover of driver licence data for a beefed up national facial biometric matching capability would only bring existing arrangements into 'real time'.
The cyberthreat from China is one more of espionage than destruction. And it's changing – perhaps even lessening.
There are technical reasons companies can be slow to update software, but as seen in the Equifax hack, a key problem is management.
The modern world depends on critical systems, networks and data repositories that are not as secure as they should be. Breaches will continue until society as a whole makes some big changes.
A roundup of research into what makes passwords secure, and options for new standards of login authentication.
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
US military bases usually get their electricity from the civilian grid, which is vulnerable to attack and to disaster. Solar-powered microgrids could protect national security, and would save money.
Some of the iPhone's innovations have made users less secure.