Universities are a prime target for cyber attacks and the weakest links in their defences are all the non-expert users of their systems. Teaching everyone basic cyber hygiene is vital.
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
The Trump administration’s attempts to ban TikTok and other Chinese technologies sets a dangerous precedent for internet regulation.
Quantum communication is needed to make the internet much more secure.
A major cyber attack on a data lake could have immense consequences for any of us. And the damage could be felt anywhere from banking to the healthcare sector.
Virtual private network companies make lots of promising claims about their services. Most people don’t have the skills to double-check their providers. So this group of researchers did the testing.
As the number of ‘internet of things’ devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
The very first cyberattack clogged up the nascent internet, halting digital communications. Now much bigger, the internet is still largely open to – and suffering regularly from – similar attacks.
Get to know your internet router a little better.
Apple’s design decisions don’t please everyone, but in the iPhone the company created something truly revolutionary that has lasted.
The recent cyber attack on the Dyn infrastructure shows why the internet of things poses a risk to us all.
The internet’s architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
Millions of new devices are going online as the Internet of Things expands. But many have security or privacy holes. Here’s what to look for to keep yourself safe online.
Getting the basics of cybersecurity right could eliminate 85% of the threats overnight. Here are some tips to get you started.
Online infrastructure and business are becoming increasingly important, as is our need to focus research efforts on securing them from cyber-attack.
Throwing a safety net over one’s computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.
Two new forms of online harassment, ‘doxxing’ and ‘swatting’, are increasing in frequency. Here’s how to protect yourself from them.
With three billion internet users and rising, a device that turns surfers into shells is a dangerous development.
The new legislation forcing telcos and internet companies to store your metadata for two years creates a new set of secuirty risks.