It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
The cyber-attack hit 200,000 computers and a number of big global organisations. But it hasn't made much in ransom money.
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
People don't want to endure the interruptions and inconveniences of keeping their computer software up to date. Research tells us why, and how we might fix the problem – and protect ourselves.
"It is time for a digital Geneva Convention to protect the internet."
NHS data is being held to ransom by criminals. This the mother of all wake-up calls.
President Trump's new executive order on cybersecurity signals some significant new federal cybersecurity efforts.
A simple idea that's surprisingly secure: drawing your own unlock pattern on a touchscreen. Faster and easier to remember than a password, and much harder to guess or crack.
Useful for expressing moods, emotions and nuances in messages, emojis could have another use: as your next smartphone password.
Going as far back as the Bible, and as widely known as the phrase 'Open, Sesame,' passwords are a textual link to our past. But they may not be around much longer.
The first line of cyberdefense is having a good password. What does research say about what that actually means?
Cybercriminals are using cloud-based services, much like regular businesses. A new study reveals important lessons for the future of fighting cybercrime.
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
The international community – and the U.S. and China in particular – should give serious thought to what might be North Korea's cyberattack equivalent of a nuclear weapons test.
Where people get advice about online safety may affect how safe they are.
New standards and regulations are beginning to govern how companies protect customers' data. Companies ignore this vital issue at their peril, both financially and legally.
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
As searches of smartphones and other digital devices at US borders become more common, can research and computer science help protect travelers' privacy?
It may sound like science fiction, but research shows that all you really need to develop brain biometrics is a set of earphones.
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.