The Morpheus secure processor works like a puzzle that keeps changing before hackers have a chance to solve it.
Alan de la Cruz via Unsplash
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
Women bring a much-needed change in perspective to cybersecurity.
Maskot/Maskot via Getty Images
Women are underrepresented in technology fields, but especially so in cybersecurity. It’s not just a matter of fairness. Women are better than men at key aspects of keeping the internet safe.
How confident should voters be that their ballots will be counted accurately?
AP Photo/Wilfredo Lee
Ensuring the integrity of democratic elections from hackers and electronic tampering, and boosting public confidence in democracy, isn’t very difficult, nor expensive.
Can they be confident their votes will count?
Russian government agents allegedly penetrated US state and county election databases. Scholars of election security offer insight and recommendations about what to do now.
Servers hosting your favorite websites may be subject to denial-of-service attacks.
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Does every person’s vote count?
Researchers reveal the ways the US election system is under threat – only one of which has anything to do with Russia.
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Taking a much closer look at what’s going on inside malware.
How do malware analysts examine software that’s designed to wreak havoc with computers? By using tools that watch software’s inner workings very closely.
Apple’s design decisions don’t please everyone, but in the iPhone the company created something truly revolutionary that has lasted.
How secure is your vote?
Hands with votes illustration via shutterstock.com
While voter fraud - despite recent allegations - is rare, how do we ensure the ballots we cast are counted accurately? If so, how? Our experts offer background and insight.
Is a Great British Firewall what UK plc perhaps needs? Or is it asking for trouble?
Having a nationwide firewall means trusting the same people who spy on communications.
Is everything on the up-and-up here?
With the DNC email leak and Trump calling on Russia to hack Clinton’s emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
Insecurity by design, as the FBI or UK government would have it, is pouring petrol on an already raging fire.
Do not adjust your set.
Museum of Malware
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.
Western governments are threatening to undermine the encryption that keeps our online communications private.
An open letter signed by security experts from around the world is calling on governments to protect encryption rather than undermine it in a quixotic attempt to tackle terrorism.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Soon you will be the key.
face scan by Franck Boston/www.shutterstock.com
The days of the username and password combo may be numbered as biometric security grows more sophisticated.
These days anyone can download the tools used for cyber crime.
Ivan David Gomez Arce/Flickr
Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
Who’s really driving your car?
Theft of vehicles is about as old as the notion of transport – from horse thieves to carjackers. No longer merely putting a brick through a window, vehicle thieves have continually adapted to new technology…