We believe fitness trackers keep us healthy, and connected toys keep children safe – but such devices are easily abused.
In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China's Uyghur minority.
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Passwords have been around for decades and we’re still getting it wrong.
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Universities are a prime target for cyber attacks and the weakest links in their defences are all the non-expert users of their systems. Teaching everyone basic cyber hygiene is vital.
If you're reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who 'do the wrong thing' is unlikely to help.
Companies today collect vast amounts of our personal data. What measures can governments and regulators take to reduce the inherent risks and keep our data?
Ransomware is quietly developing into one of the most disruptive – and lucrative – forms of cybercrime.
Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Cybersecurity risks are evolving rapidly. How can they be more effectively assessed and managed?
A scholar of cyber conflict sets out why retaliation doesn't prevent future attacks, and explains what might have a better chance.
Cyberwarfare is more like cancer than bombs and bullets. Cybersecurity experts are just beginning to make their diagnosis of the Sunburst hack.
America's public schools often lack the adequate security to protect their students' most sensitive data from being linked on the web.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here's the state of election cybersecurity.
Universities hold valuable information but are large and porous communities, with legacy IT systems often adding to the risks. But following a few basic rules can help counter cyber attacks.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they're not all equally protective.
The Australian government's new cyber security plan moves in the right direction, but success will depend on how it's executed.