Many organisations abide by a “zero trust” rule wherein absolute trust is placed in nothing, apart from a central identity and access management system. But what happens when this system is breached?
The social media strategies of many parties and candidates aim to bypass mainstream media to speak directly to voters, but they are often not as sophisticated as is assumed.
Cryptocurrency allows Ukraine to get quick financial support, and Russia, to bypass international sanctions and protect some of its economic interests.
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
This deceptively simple online word guessing game has captured the English-speaking world.
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.
A UN working group on cybersecurity is making incremental progress in highlighting the importance of including and protecting civilians.
We believe fitness trackers keep us healthy, and connected toys keep children safe – but such devices are easily abused.
In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China’s Uyghur minority.
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
Passwords have been around for decades and we’re still getting it wrong.
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Universities are a prime target for cyber attacks and the weakest links in their defences are all the non-expert users of their systems. Teaching everyone basic cyber hygiene is vital.
If you’re reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who ‘do the wrong thing’ is unlikely to help.
Companies today collect vast amounts of our personal data. What measures can governments and regulators take to reduce the inherent risks and keep our data?
Ransomware is quietly developing into one of the most disruptive – and lucrative – forms of cybercrime.
Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.