Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Cybersecurity risks are evolving rapidly. How can they be more effectively assessed and managed ?
A scholar of cyber conflict sets out why retaliation doesn’t prevent future attacks, and explains what might have a better chance.
Cyberwarfare is more like cancer than bombs and bullets. Cybersecurity experts are just beginning to make their diagnosis of the Sunburst hack.
America’s public schools often lack the adequate security to protect their students’ most sensitive data from being linked on the web.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here’s the state of election cybersecurity.
Universities hold valuable information but are large and porous communities, with legacy IT systems often adding to the risks. But following a few basic rules can help counter cyber attacks.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
The Australian government’s new cyber security plan moves in the right direction, but success will depend on how it’s executed.
Hackers demonstrated they can take over Twitter’s technology infrastructure, a brazen move that hints at how such an attack could destabilize society.
A recent ransomware attack on the UK electricity system shows this pandemic is also about computer viruses.
Vulnerable websites are popping up as organizations move online during the coronavirus pandemic – and hackers have more time at home alone. The result is more websites falling victim to defacement.
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it’s time to change that.
The coronavirus pandemic lays bare the many vulnerabilities created by society’s dependence on the internet. Watch the video to learn more about these issues.
Amazon says it’s the “new neighbourhood watch” but Ring may just be another technology that gives police too much data and lets neighbourhoods double down on their biases.
Government privacy commissioners are investigating a data breach at one of Canada’s largest medical services companies, after hackers gained access to the personal information of 15 million customers.
Research shows we’re pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Drones are now an integral part of defence force capability, from intelligence gathering to unmanned theatre engagement. But what happens if our own technology is turned against us?
The announcement of a systemic attack on the Internet in February 2019 raises the question of the structure and protection of one of the major protocols of the web: the domain name service (DNS).