A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Universities are a prime target for cyber attacks and the weakest links in their defences are all the non-expert users of their systems. Teaching everyone basic cyber hygiene is vital.
If you’re reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who ‘do the wrong thing’ is unlikely to help.
Companies today collect vast amounts of our personal data. What measures can governments and regulators take to reduce the inherent risks and keep our data?
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.