It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
People don't want to endure the interruptions and inconveniences of keeping their computer software up to date. Research tells us why, and how we might fix the problem – and protect ourselves.
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
You know it's a serious problem when even Google and Paypal have been targeted.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
'Denial of service' cyberattacks are increasingly used to shut down websites. New research reveals that 911 call centers are vulnerable to the threat as well.
We've all called up IT for help and been asked to turn our machines off and on again. Here's why.
How can archivists properly preserve computer programs often written specifically to destroy data?
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
We are deepening our understanding of why people fall victim to the attacks in the first place.
Cyberattacks are on the rise in South Africa. New legislation is important, but it won't solve the problem if it's not accompanied by user education.
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
A widespread and virulent ransomware, Angler, is de-fanged by having the world's most widely-used networking equipment ignore it
Jailbreaking your iOS device can free you from Apple's 'walled garden', but it's a Wild West beyond the walls.
Rombertik malware will happily take the nuclear option on your hard drive.
Recognising malware patterns is key to the effectiveness of antivirus programs.