A North Korean ballistic rocket launching drill, undated photo.
REUTERS/ North Korea's Korean Central News Agency (KCNA)
Tensions in Asia may soon boil over. If U.S. leaders fail to seek pathways to peace, the consequences may be grim, warns former National Security Council member.
Phishing for information and money.
You know it's a serious problem when even Google and Paypal have been targeted.
What do you do if a border official asks for your phone PIN?
Following reports of travellers to the US being forced to unlock their phones for border officials, here are some steps you can take to prevent your personal data from being exposed.
START Global Terrorism Database Terrorist Attacks Concentration Intensity Map.
University of Maryland
President Trump has asserted that media coverage of terrorist attacks under-represents their actual extent. Analysis of 50 years of news coverage answers this question, and raises others.
Foreign Minister Adel al-Jubeir will likely intensify the Washington charm offensive and continue to stress Saudi Arabia’s indispensability to regional security and terrorism matters.
This year will continue to be a period of great uncertainty in Saudi Arabia. After a deterioration of relations with the United States under President Obama, the kingdom will be focused on strengthening…
An insider can bypass many layers of security.
Los Alamos National Laboratory
Basic safeguards are not enough to protect against insider threats. It requires rethinking how to overcome the biases that cause us to dismiss the danger.
It’s not always obvious where a new technology will end up.
NIH Image Gallery
A scientific breakthrough in a vacuum may be free of ethical implications. But many developments can be used for good or evil, or both. There's a fine balance on what to control and to what extent.
Anger at Trump’s immigration controls continues to spread.
Trump has pointed the finger at Obama for creating the list of seven countries in his new travel ban.
Protesters gather on the National Mall for the Women’s March on Washington during the first full day of Donald Trump’s presidency.
John Minchillo/AP Photo
Inaugural weekends are snapshots of the cultural and political zeitgeist. How did this year's compare to those from 2009 and 2005?
On his way to the White House, Jan. 20, 2017.
AP Photo/Andrew Harnik
Is Trump correct in asserting that NATO has outlived its utility? Or that NATO’s members enjoy a 'free ride' on the back of the US? A political scientist examines the evidence.
Private security companies can help in family violence situations, but questions remain.
Initial experience indicates that private security companies can provide a beneficial service to victims of family violence, but there are still concerns that need to be addressed.
Business executives need to pay more attention to the information they are protecting.
Instead of relying on cyber insurance to protect businesses against the damages of attacks, executives should get to know the information they are protecting.
Crime is declining, but people are getting more and more defensive about their homes.
The dark web is often used for illegal activity and because of the way it's structured, it's hard to police.
Open-source code can be a literal lifesaver.
When lives are at stake, there's no time for secrecy. Just publish the code.
Many South Africans fear and mistrust the police.
Clashes between student protesters and armed security (whether public or private) compel South Africans to consider the role of use of force in the context of protests.
French policemen investigating the abandonment of a car packed with gas cylinders near Paris’s Notre Dame cathedral.
The recent arrest of female terrorists in France brought attention to the role women play in IS. A group of American academics studied this issue – with a surprising result.
Jose Louis Morales sits and prays under his brother Edward Sotomayor Jr.‘s cross for victims of the Pulse nightclub shooting in Orlando.
Are Americans at increasing risk of being killed in a terrorist attack? A sociologist explains how the way we remember the dead may make it feel that way.
There is a risk of cyber attack from China on Australian assets like Ausgrid.
There is a real threat from Chinese ownership of electricity networks such as Ausgrid. The Treasurer needs to be more frank about these threats.
The bids from two Chinese firms for the lease of NSW electricity network Ausgrid have been rejected by the Australian Treasurer.
The Chinese government is changing its role in state-owned enterprises and there's less cause for concern about the investment bids of these firms in Australia.