Rudi Dicks, a senior specialist at BDO’s Forensics and Cyber Lab, has seen a lot when it comes to the world of online security.
An electrical grid’s computerized control could be abused by attackers who get into the systems.
A hacker’s guide to being cyber-safe.
What are the consequences of the NSA being hacked?
We find out just what it takes to hack a South African company.
Purposeful creation of malicious AI will likely be attempted by a range of individuals and groups, who will experience varying degrees of competence and success.
It’s not hard to see why smartphones are a hacker’s weapon of choice.
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
With smarter, individualized training, we could convert many of these weak links into strong detectors – and in doing so, significantly strengthen cybersecurity.
It is possible that the public’s default expectation about Internet transactions will change from “we are basically safe” to “we are going to have our data stolen.”