The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.
How do malware analysts examine software that’s designed to wreak havoc with computers? By using tools that watch software’s inner workings very closely.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Simply updating and patching an organisation’s computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
People don’t want to endure the interruptions and inconveniences of keeping their computer software up to date. Research tells us why, and how we might fix the problem – and protect ourselves.
The technical consensus is clear: Adding ‘backdoors’ to encryption algorithms weakens everyone’s security. So what are the police and intelligence agencies to do?
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
‘Denial of service’ cyberattacks are increasingly used to shut down websites. New research reveals that 911 call centers are vulnerable to the threat as well.
Ransomware – which encrypts your files and offers to sell you the key – operates differently from other malicious software. Those differences turn out to give potential victims a fighting chance.