Researchers used a fax machine that wasn't even connected to the internet to break into a computer network.
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
All the cyber threats that fans and footballers face at the World Cup...and tips for remaining safe.
World Water Day shines a light on the importance of safe, clean drinking water, but a new report finds Canada's freshwater systems are under stress.
More connected devices means more vulnerability to cyberattacks. Is there a cheap, easy and secure way to protect the internet and the world?
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Biologists' growing reliance on computers advances the field – but comes with new risks. The first step toward improved cyberbiosecurity is increasing awareness of possible threats.