Universities hold valuable information but are large and porous communities, with legacy IT systems often adding to the risks. But following a few basic rules can help counter cyber attacks.
Humans are the weak link in cyber security. But there may be a solution to making us safer, using the technology of exercise and lifestyle apps
Researchers used a fax machine that wasn’t even connected to the internet to break into a computer network.
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Cybersecurity is an increasingly relevant concern in our society, but pop culture tells us virtually nothing useful about it.
Kenya’s new Computer and Cyber Crime Act must not be abused by the criminal justice system.
North Korea’s cyber army is closely controlled by the ruling regime – a key difference from other countries’ cyberattack and espionage groups.
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Wasting time on the internet at work could be putting your company’s cyber-security at risk.
It won’t be like an army of robots marching in the streets, but AI hacking is on the horizon.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
The technical consensus is clear: Adding ‘backdoors’ to encryption algorithms weakens everyone’s security. So what are the police and intelligence agencies to do?
The president, the press and the public have misguided ideas about how intelligence is produced and analyzed. A Georgetown professor sets us straight.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect’s iPhone?
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
Doing something about online security would be best. But talking about it is a good start.
The protection of trade secrets is an area of concern for both countries and is more likely to lead to an agreement.
Throwing a safety net over one’s computer, mobile handset or tablet is a necessity because of the threat of viruses and infections through removable devices.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.