It’s true that phones aren’t as prone to viruses as computers – but they’re still far from immune.
Artificial intelligence is emerging as a key cybersecurity tool for both attackers and defenders.
Ransomware has gone professional, with criminal consultants, affiliates and brokers – arresting them all will be difficult.
Crude text scams, sent en masse, only have to work a handful of times to make criminals significant sums of cash.
Most computer security focuses on software, but computer processors are vulnerable to hackers, too. An experimental secure processor changes its underlying structure before hackers can figure it out.
It’s still too early to say who attacked Channel Nine, disrupting its live broadcasts over the weekend. But fingers have been pointed at Russian state actors using a tactic nicknamed ‘wiperware’.
A ransomware attack on election-related government computers in a Georgia county raises the specter of more disruptions for Election Day voting and vote tabulation.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
Russian agents reportedly placed malware in U.S. voter registration systems in 2016 and are actively interfering in the 2020 election. Here’s the state of election cybersecurity.
The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple’s reputation for security. But you can fix the problem by updating your phone’s software.
Cyber-criminals are targeting city authorities because they often pay out – but there are other ways to protect public data and services.
The idea of CRISPR as scissors ignores an entire ecosystem of moving parts that are crucial for understanding the awe-inspiring, crazy thing scientists are trying to do when they attempt gene editing.
Ransomware has crippled governments and companies around the world, encrypting data and demanding payment for the decryption key – though that’s no guarantee of recovering the information.
The latest malware is designed especially to make small companies pay through the nose for their data.
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here’s what could happen if you do – and how you can minimise your risk.
Before you download antivirus and ad-blocker apps, do your due diligence on what personal information they want to access. Here are some tips on what to look out for.
Enterprising cryptocurrency enthusiasts have found a way to use your computer processor and electricity to make themselves money. What is cryptojacking, and how does it work?
Revelations about the fitness app have turned up the heat on the privacy and security risks of wearables.
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.