Seeking a peaceful handover of power between parties and political opponents.
It's true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
Are online black markets this direct?
Hands exchanging money via shutterstock.com
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Your mobile number is all a hacker needs to read your texts, listen to your calls and even track your whereabouts.
Online activism now means creating alternative ways to work, communicate and protest.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
What would you do if your files were locked away?
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
2015 saw us complete our exploration of all nine planets (including dwarf planet Pluto) in our solar system.
2015 was a year where we expanded our view of the universe, embraced new technologies and got a hint of the profound changes to come.
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
UK plc has a cybersecurity mountain to climb.
A widespread and virulent ransomware, Angler, is de-fanged by having the world's most widely-used networking equipment ignore it
Which operating system is safer from a hack attack?
The argument has been raging for years: which operating system is the safest when it comes to security. Has the latest software upgrades from the tech giants changed anything?
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are.
If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
The divide between 'legal' and illegal hacking is very, very thin.
Why did Penn State take so long to disclose the breach?
Laptop image via www.shutterstock.com
The recent cyber attacks at Penn State have put personal information of 18,000 students in the hands of hackers. What should universities do to protect students' privacy?
We all need to clean up our online acts.
Intel Free Press
No matter how strong an organization's cybersecurity, our own bad behavior could make us the "unintentional insiders" for the next big hack.
Harnessing the quantum property of light takes security to the next level.
Decades of data security research have brought us highly reliable, standardized tools for common tasks such as digital signatures and encryption. But hackers are constantly working to crack data security…
Is it a crime scene or just a store checkout? Could be both.
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
The way in is simple.
The investigation of the hack that gave the world access to hundreds of nude celebrity pictures identified another massive gap in online security. Given Apple’s reputation of being among the more secure…
The changing face of security threats.
Late one Saturday evening in March, NATO’s Headquarters experienced a large-scale cyber-attack at the hands of a group calling itself Anonymous Bierkut from Ukraine. Non-classified networks were targeted…