A ransomware attack on election-related government computers in a Georgia county raises the specter of more disruptions for Election Day voting and vote tabulation.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here's the state of election cybersecurity.
The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple's reputation for security. But you can fix the problem by updating your phone's software.
Cyber-criminals are targeting city authorities because they often pay out – but there are other ways to protect public data and services.
The idea of CRISPR as scissors ignores an entire ecosystem of moving parts that are crucial for understanding the awe-inspiring, crazy thing scientists are trying to do when they attempt gene editing.
Ransomware has crippled governments and companies around the world, encrypting data and demanding payment for the decryption key – though that's no guarantee of recovering the information.
The latest malware is designed especially to make small companies pay through the nose for their data.
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here's what could happen if you do – and how you can minimise your risk.
Before you download antivirus and ad-blocker apps, do your due diligence on what personal information they want to access. Here are some tips on what to look out for.
Enterprising cryptocurrency enthusiasts have found a way to use your computer processor and electricity to make themselves money. What is cryptojacking, and how does it work?
Revelations about the fitness app have turned up the heat on the privacy and security risks of wearables.
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Scanning physical items constructed with nefarious intent can introduce malware into a smartphone or computer.
The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.
How do malware analysts examine software that's designed to wreak havoc with computers? By using tools that watch software's inner workings very closely.
Mayhem, not money, seems to be the ultimate aim of the latest attack unleashed on computer networks around the world.
It's not safe out there for an app.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.