Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
A woman holds a phone in front of the office of NSO Group, which makes a tool that can see and hear everything a phone is used for.
Jack Guez/AFP via Getty Images
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.
Cybersecurity is a growing global threat.
(Shutterstock)
In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China’s Uyghur minority.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Many still make their passwords too simple.
Shutterstock/Vitalii Vodolazskyi
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Universities are a prime target for cyber attacks and the weakest links in their defences are all the non-expert users of their systems. Teaching everyone basic cyber hygiene is vital.
If you’re reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who ‘do the wrong thing’ is unlikely to help.
How can we keep our personal data safe?
Jim Kaskade/Flickr
Companies today collect vast amounts of our personal data. What measures can governments and regulators take to reduce the inherent risks and keep our data?
Ransomware is quietly developing into one of the most disruptive – and lucrative – forms of cybercrime.
Military units like the 780th Military Intelligence Brigade shown here are just one component of U.S. national cyber defense.
Fort George G. Meade Public Affairs Office/Flickr
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Cybersecurity risks evolve rapidly, and are everywhere.
Joshua Gandara/Unsplash
Cybersecurity risks are evolving rapidly. How can they be more effectively assessed and managed ?
The U.S. Justice Department was among many federal agencies and private companies whose networks suffered intrusions from Russian hackers.
AP Photo/Jacquelyn Martin
A scholar of cyber conflict sets out why retaliation doesn’t prevent future attacks, and explains what might have a better chance.
Federal government agencies, from the Treasury Department to the National Nuclear Security Administration, have been compromised by the attack.
Tasos Katopodis/Getty Images