Ransomware has gone professional, with criminal consultants, affiliates and brokers – arresting them all will be difficult.
Crude text scams, sent en masse, only have to work a handful of times to make criminals significant sums of cash.
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
It’s still too early to say who attacked Channel Nine, disrupting its live broadcasts over the weekend. But fingers have been pointed at Russian state actors using a tactic nicknamed ‘wiperware’.
A ransomware attack on election-related government computers in a Georgia county raises the specter of more disruptions for Election Day voting and vote tabulation.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here’s the state of election cybersecurity.
The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple’s reputation for security. But you can fix the problem by updating your phone’s software.
Cyber-criminals are targeting city authorities because they often pay out – but there are other ways to protect public data and services.
The idea of CRISPR as scissors ignores an entire ecosystem of moving parts that are crucial for understanding the awe-inspiring, crazy thing scientists are trying to do when they attempt gene editing.
Ransomware has crippled governments and companies around the world, encrypting data and demanding payment for the decryption key – though that’s no guarantee of recovering the information.
The latest malware is designed especially to make small companies pay through the nose for their data.
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here’s what could happen if you do – and how you can minimise your risk.
Before you download antivirus and ad-blocker apps, do your due diligence on what personal information they want to access. Here are some tips on what to look out for.
Enterprising cryptocurrency enthusiasts have found a way to use your computer processor and electricity to make themselves money. What is cryptojacking, and how does it work?
Revelations about the fitness app have turned up the heat on the privacy and security risks of wearables.
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Scanning physical items constructed with nefarious intent can introduce malware into a smartphone or computer.
The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.