Money is a crucial target for North Korea’s hacking efforts.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Wasting time on the internet at work could be putting your company's cyber-security at risk.
Hackers will start to get help from robots and artificial intelligence soon.
It won't be like an army of robots marching in the streets, but AI hacking is on the horizon.
It’s software: There’s always a way in.
BeeBright via shutterstock.com
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
At CIA headquarters on Jan. 17, Trump said the ‘dishonest media’ made it appear he was having a feud with the intel community.
Olivier Douliery/AP via CNP
The president, the press and the public have misguided ideas about how intelligence is produced and analyzed. A Georgetown professor sets us straight.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Do not adjust your set.
Museum of Malware
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.
An out of date operating system can let the hackers in to your computer network.
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
Doing something about online security would be best. But talking about it is a good start.
Will the US-China relationship devolve into Spy vs Spy?
The protection of trade secrets is an area of concern for both countries and is more likely to lead to an agreement.
Anti-virus software can keep cyber-criminals at bay.
Throwing a safety net over one's computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
The internet of things – including the equipment on the power grid – is increasing cybersecurity risks for all critical infrastructure.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Claims that a cybersecurity expert hacked an aeroplane's cockpit might not be as unbelievable as they first seem.
There's no excuse for big firms letting basic attacks compromise their customers' data.
These days anyone can download the tools used for cyber crime.
Ivan David Gomez Arce/Flickr
Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
We all need to clean up our online acts.
Intel Free Press
No matter how strong an organization's cybersecurity, our own bad behavior could make us the "unintentional insiders" for the next big hack.