Does every person’s vote count?
AntonSokolov/Shutterstock.com
Researchers reveal the ways the US election system is under threat – only one of which has anything to do with Russia.
Shutterstock
Cyberattacks are in the top five global risks, behind extreme weather events and natural disasters. But global cooperation remains deeply problematic.
Staying safe online requires more than just a good password.
Rawpixel.com/Shutterstock.com
Four important elements to consider when evaluating how safe you are online.
The government’s Defence Export Strategy aims to make Australia a world leader in arms exports.
Shutterstock
The government wants Australia to grow defence exports 800% by 2028. Investing in the cyber industry may be the only way to get there.
Shutterstock
But despite the UK’s alarmist tone on the incoming NIS directive, it’s not just about the hefty £17m fines.
Is this cloud secure?
SWEviL/Shutterstock.com
Storing data in the cloud is convenient, but how secure is it? And what are users’ options for stepping up their data security?
A call to better track manufacturing, shipping and distribution.
Travel mania/Shutterstock.com
Flaws in manufacturing processes can cause chip flaws like Spectre and Meltdown – and blockchain technology may offer a solution.
Shutterstock
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Brett Johnson tears up when he mentions the FBI special agent who helped him quit online fraud.
Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.
Cyber attacks have the potential to cause economic disruption, coerce changes in political behaviour and subvert systems of governance.
from www.shutterstock.com
Cyber security has dominated international affairs in 2017, with the US election hack as one of the main stories. The ongoing investigation shows that cyber attacks can subvert systems of governance.
Shutterstock
Wasting time on the internet at work could be putting your company’s cyber-security at risk.
The Iranian Cyber Army has taken over many websites.
Zone-H
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
Modern advances come with new liabilities.
Sergey Nivens/Shutterstock.com
Biologists’ growing reliance on computers advances the field – but comes with new risks. The first step toward improved cyberbiosecurity is increasing awareness of possible threats.
We want your data.
gualtiero boffi / Shutterstock.com
The rate at which valuable identity information is flying out of the control of firms is alarming – more than 3,500 records per minute.
Bad news on the doorstep. How to stay safe?
Shutterstock.
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
Who should be allowed inside?
PopTika/Shutterstock.com
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
What’s the best way to keep data secure?
Victor Moussa/Shutterstock.com
The FBI and police officials say they need to decrypt secure communications to fight crime. But they have other options, and modern threats make clear the importance of strong encryption.
supimol kumying/Shutterstock
It turns out you can’t ensure cyber-security in the world’s fifth-largest employer if there’s no one in charge of making it happen.
Some Peace Corps volunteers already provide computer assistance and instruction.
Peace Corps
The US could help solve a global security problem and boost its image abroad by helping willing experts share their cybersecurity knowledge around the country and the globe.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.