Ransomware has gone professional, with criminal consultants, affiliates and brokers – arresting them all will be difficult.
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
A thriving black market for stolen personal data makes millions of people vulnerable to spies, spammers, scammers and hackers.
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
It’s possible that hackers could have infiltrated and spied on Boris Johnson’s personal phone from as early as 2006.
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Cyber attacks have created new dilemmas for philosophers who determine the ethics of war.
Commercial software is vital to all of our cybersecurity. What should governments do if they find it has weaknesses?
Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
Russian interference deeply marked the 2016 American presidential election. Four years later, let’s analyze the form and impact of disinformation coming from Russia.
Australia’s new voluntary code of practice to make IoT devices more secure may expose consumers to greater risks.
Taiwan has a population of over 20 million people and no new cases of coronavirus since mid-April. Embracing ‘digital democracy’ and ‘hacktivism’ have been the keys to their success.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
DIY labs have disrupted industries from alcohol to pharmaceuticals. During the coronavirus pandemic, curious people have more opportunities to innovate from home.
Legislation expected to be put to Parliament later this year may very well fall short due to COVID-19’s budget impacts. But until we strengthen our cyber defences, we’re all at risk.
A social media researcher explains how bots and sock puppet accounts manipulate and polarize public debate.
Australia is coming under sustained cyber attack by a ‘state-based’ actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.