There are a few things you can do to keep yourself safe online.
Getting the basics of cybersecurity right could eliminate 85% of the threats overnight. Here are some tips to get you started.
Cyber criminals have found a way to harvest data from iPhones and iPads using the weak point in Apple's otherwise top security system - app developers.
Apple’s ‘walled garden’ might be frustrating, but it does protect your devices from being hacked.
Jailbreaking your iOS device can free you from Apple's 'walled garden', but it's a Wild West beyond the walls.
Giving away the keys to cybercriminals.
Intel Free Press/flickr
Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. There are a number of surprising observations…
A biohack event called Rock’n Roll BioTech, held at Aalto University in Helsinki, brings people together to learn about the fundamentals of molecular life-sciences outside of conventional circles.
There's a new counter-culture movement that is seeking to bypass the bureaucracy of science and hack biology for the benefit of the masses.
caught by Captblack76/shutterstock.com
While fallout from the Ashley Madison hack continues to spread, it's worth remembering that views on infidelity have not always been so severe.
Many people might be in trouble care of the Ashley Madison hack.
If the Ashley Madison hack was an inside job, then it shows that even strong protection against outside attacks isn't necessarily enough to prevent a leak of private data.
It’s not just the badge that gets nicked.
Poor-quality crypto puts millions of car owners at risk – so why did UK courts help try to cover it up?
Which operating system is safer from a hack attack?
The argument has been raging for years: which operating system is the safest when it comes to security. Has the latest software upgrades from the tech giants changed anything?
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are.
If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
Not what anyone wants to see while driving.
Car manufacturers need to get a handle on their software problem, before cars start crashing.
For Lauri Love, being treated as a terrorist is no laughing matter.
When political activists are treated like terrorists who plot and kill, state power is misdirected.
When your car becomes a computer, your problems just got much bigger.
car by Denys Prykhodov/shutterstock.com
Drive-by car hack suggests auto manufacturers seem unprepared for the security risks unleashed from internet-connected cars.
Despite its longevity, now there’s more than just aesthetic reasons to drop Flash.
logo by 360b/Shutterstock.com
As big browsers and sites like YouTube drop support, are our Flash days numbered?
In what has been labelled as poetic justice by some, the Hacking Team, an Italian company that sells mass computer and mobile device surveillance software has itself been hacked. The alleged hackers, tweeting…
The divide between 'legal' and illegal hacking is very, very thin.
Cybersecurity is becoming increasingly important.
Online infrastructure and business are becoming increasingly important, as is our need to focus research efforts on securing them from cyber-attack.
Will the US-China relationship devolve into Spy vs Spy?
The protection of trade secrets is an area of concern for both countries and is more likely to lead to an agreement.
The end of privacy?
Israel is suspected of spying on Iran's nuclear talks using a virus to hack the devices that are all around us.