Malicious and criminal attacks were the cause of 59% of data breaches in the last three months, according the latest reported figures.
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Cybersecurity is an increasingly relevant concern in our society, but pop culture tells us virtually nothing useful about it.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
Data breaches are fact of modern life. It's likely each of us will have our personal information compromised at some point. Here's how to reduce the risk and limit the damage if and when it occurs.
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Kenya’s new Computer and Cyber Crime Act must not be abused by the criminal justice system.
Google and Facebook reign supreme over digital advertising. Yet the Cambridge Analytica scandal, and when the effectiveness of this advertising seems limited, should we ban this model?
Where does responsibility lie if a person acts under the influence of their brain implant? As neurotechnologies advance, a neuroethicist and a legal expert write that now's the time to hash it out.
Do you think you’ve set up your Facebook account so that only your friends can see your information? Think again…
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Australian regulators face similar problems as their Australian counterparts in getting cryptocurrency platforms to regulate and prosecuting them when things go wrong.
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Wasting time on the internet at work could be putting your company's cyber-security at risk.
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.