Cybercriminals may steal data from laptops and mobile phones when they are plugged in via USB ports.
The UK has become surprisingly willing to brief the press about possible use of cyber attacks, including against Russia in response to the Skripal attack.
The Achilles' heel of law technologies: training. Only 10% of such initiatives are aimed at law students, so how should this issue be managed to win the AI race?
BA's handling of the latest corporate cyber attack shows a catalogue of missed opportunities.
Ensuring the integrity of democratic elections from hackers and electronic tampering, and boosting public confidence in democracy, isn't very difficult, nor expensive.
A cybersecurity expert offers tips to keep high schoolers safe on mobile devices, computers, games and social media.
In reality, cybersecurity attacks are like a disease affecting people globally.
Fifteen years after the Northeast Blackout of 2003 cut power to 50 million people in the US and Canada, experts explain that many threats to the electricity grid remain.
Power utilities' cybersecurity practices may be effective, but need to evolve over time. And all companies operating elements of the grid – even the small ones – should step up.
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Cybersecurity is an increasingly relevant concern in our society, but pop culture tells us virtually nothing useful about it.
As the microchip industry celebrates the 50th anniversary of chipmaker Intel's founding, engineers and researchers call for a complete rethinking of computer architecture.
Russian government agents allegedly penetrated US state and county election databases. Scholars of election security offer insight and recommendations about what to do now.
IAFEI and partners Duke University and Grenoble EM regularly survey CFOs across the world. For the second quarter 2018, the poll ran from May 13 to June 7, 2018.
Ten years after the publication of two major works about violence, their authors meet to discuss their theories and renew the debate.
Cyber vulnerabilities in shipping show how far the industry has to go. But proper cyber security of ships is more complex than you might initially think.
It is hard to know whether metadata retention has been effective or necessary. We can only hope that the debate over accessing and analysing encrypted services is a little more enlightening.
New research has uncovered a previously unknown weakness in smart city systems: devices that trust each other. That could lead to some pretty terrible traffic, among other problems.
As more physical objects are becoming digitalised, it is leading to greater national security risks.
Framing cyberspace as a national security concern can quickly erode fundamental human rights.