UK plc has a cybersecurity mountain to climb.
Cyber crime costs South Africa between R2,5 billion and R5,8 billion annually.
South Africans are being targeted by cyber criminals. Consumers are fleeced because their passwords make them vulnerable.
The restructure Google should look at the world's big challenges rather than create solutions to problems that don't exist yet.
Quantum key distribution technology can be implemented with single photons using an optical channel to encrypt any data transmission.
There will be a quantum leap in securing online confidentiality with key distribution technology.
Despite its longevity, now there’s more than just aesthetic reasons to drop Flash.
logo by 360b/Shutterstock.com
As big browsers and sites like YouTube drop support, are our Flash days numbered?
A new threat to secure online communication could be a symptom of a wider cyber security problem.
There's no excuse for big firms letting basic attacks compromise their customers' data.
Vote early, vote often - but if it’s not secure people won’t vote at all.
vote by Feng Yu/shutterstock.com
Online voting could boost turnout, but a flawed system could destroy faith in the voting process.
Back in charge.
Freed of the Liberal Democrats' influence, here are some of the things the Conservative government has in store for us.
When the SWAT team bursts into your bedroom, it’s not only unpleasant but potentially deadly.
Two new forms of online harassment, 'doxxing' and 'swatting', are increasing in frequency. Here's how to protect yourself from them.
What if the police told you that you were being scammed – would you continue to send money?
An estimated A$75,000 is lost by Australians everyday to online fraud but police are having some success in alerting people before they even know they're being scammed.
Is mass data retention the way to go or should authorities be forced to come back with a warrant to find what they want?
As the Australian government pushes on with its data retention bill there are still questions about what safeguards and protections are in place, and a look at similar moves that have failed overseas.
The metadata report disregards a range of reports demonstrating that retention is ineffective.
The endorsement of Australia's data retention bill raises questions about why the reforms are being pushed now, when they had been resisted by others for so long.
There are still unanswered questions about the government’s proposed metadata retention bill.
What the experts think of the Parliamentary Joint Committee on Intelligence and Security's report on the proposed metadata retention laws.
Who is Doug talking to, and will Australia’s proposed metadata retention scheme be able to find out?
The Australian government's meta data retention bill cares more about who you connect with than what services you may use. Yet many such online services may also be out of its reach.
Tor, your online an-onionising software.
The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software…
The ghosts of Linux.
Following the trend of giving catchy names to serious operating system security flaws, the Linux vulnerability revealed recently by security researchers Qualys has been called Ghost. Like Heartbleed and…
Storm clouds gathering over the city.
The financial institutions of the City of London and Wall Street are to take part in a series of “war game” exercises aimed at testing their resilience to cyber attack. The announcement comes as prime…
Hacking and making a profit isn’t as easy as it looks.
In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
Is it a crime scene or just a store checkout? Could be both.
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…