Data breaches are fact of modern life. It's likely each of us will have our personal information compromised at some point. Here's how to reduce the risk and limit the damage if and when it occurs.
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Sweden's deep relationship with digital technology helps explain why its biohacking scene is so unique.
Kenya’s new Computer and Cyber Crime Act must not be abused by the criminal justice system.
Google and Facebook reign supreme over digital advertising. Yet the Cambridge Analytica scandal, and when the effectiveness of this advertising seems limited, should we ban this model?
Where does responsibility lie if a person acts under the influence of their brain implant? As neurotechnologies advance, a neuroethicist and a legal expert write that now's the time to hash it out.
US law limits public employees' political activity. But in today's hyperpartisan political world, it's getting harder for public employees to navigate between professional neutrality and politics.
Do you think you’ve set up your Facebook account so that only your friends can see your information? Think again…
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Australian regulators face similar problems as their Australian counterparts in getting cryptocurrency platforms to regulate and prosecuting them when things go wrong.
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Wasting time on the internet at work could be putting your company's cyber-security at risk.
Uber has admitted that the 2016 data breach puts at risk the personal information of 57 million users.
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
KRACK can only be used in certain circumstances, and there are some steps you can take to keep your internet traffic safe.
Love him or hate him, Donald Trump has shown us a great deal in his short time on the political stage. For that, we should be grateful. Here are the lessons taught by Prof. Trump.