Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.
Taking a much closer look at what’s going on inside malware.
MuchMania/Shutterstock.com
How do malware analysts examine software that’s designed to wreak havoc with computers? By using tools that watch software’s inner workings very closely.
NotPetya is something a little different.
EPA/ROB ENGELAAR
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help.
Shutterstock/napocska
Simply updating and patching an organisation’s computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
The market for exploiting software vulnerabilities can be traced back to the 90s where “phreaking” - modifying telecommunications technology - was popular.
Jennifer/Flickr
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
People don’t want to be interrupted to update their software.
irin73bal via Shutterstock.com
People don’t want to endure the interruptions and inconveniences of keeping their computer software up to date. Research tells us why, and how we might fix the problem – and protect ourselves.
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding ‘backdoors’ to encryption algorithms weakens everyone’s security. So what are the police and intelligence agencies to do?
Phishing for information and money.
shutterstock.com
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
When calling these people, you want to be able to get through.
Fairfax County, Virginia
‘Denial of service’ cyberattacks are increasingly used to shut down websites. New research reveals that 911 call centers are vulnerable to the threat as well.
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.
Criminals who hide their computers shouldn’t go free.
Computer criminal via shutterstock.com