Brett Johnson tears up when he mentions the FBI special agent who helped him quit online fraud.
Two days with former online fraudster, Brett Johnson, who once made it onto the infamous US Most Wanted list.
Alexander Vinnik (right), suspected of running a money laundering operation using bitcoin, denies all charges against him.
Allegations bring to the fore questions over the legitimacy of bitcoin – a sound investment tool or a massive scam?
The Iranian Cyber Army has taken over many websites.
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
We want your data.
gualtiero boffi / Shutterstock.com
The rate at which valuable identity information is flying out of the control of firms is alarming -- more than 3,500 records per minute.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Confidence scams carried out online are still rampant.
R. Stevens/CREST Research
Cybercrime affects individuals and families as they navigate online life. But significant efforts focus instead on cybersecurity, protecting institutional networks and systems – rather than people.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
Can criminals use cryptocurrency to hide their identities and activities?
As cryptocurrency systems improve, they will better protect criminals' identities and even allow people to offer anonymous rewards for crimes they want committed.
More cryptocurrencies appear all the time.
Cybercriminals increasingly depend on e-currencies to profit from their misdeeds. They, and their potential victims, could be driving some of the growth in cryptocurrency markets.
Are Australian police doing enough with the data they have?
Many Australians are unaware of current police and intelligence powers when it comes to accessing our data.
Police operations online sometimes have shaky legal grounds.
U.S. Justice Department/Handout via REUTERS
Without proper checks, police could have significantly expanded scope to search homes and computers around the world.
Anxieties about hoodlums in cars was just another expression of an age-old fear of change.
Australian police often have to request data about suspects from overseas.
AAP Image/Australian Federal Police
Support from overseas law enforcement and tech companies is typically a slow and cumbersome process.
Cars are effectively becoming computers on wheels – and very attractive to cyber criminals.
Who’s inside the hoodie?
The Russian cyberthreat goes back over three decades, extends into the country's educational systems and criminal worlds, and shows no signs of letting up.
Why did I click “download”?
Confidential data and even human lives are at risk thanks to the huge spread of connected technology in healthcare.
Though popular culture might suggest otherwise, cyberbullying isn’t just a white problem.
A recent Pew survey reported that young African-Americans are more likely to be both victims and perpetrators of cyberbullying. Why?
Online frauds on credit cards are on the rise especially during holidays.
Cyber financial crime is on the rise globally. Here's how you can stay safe.
Australia’s cybersecurity strategy needs some work.
The Australian government's cybersecurity report card is out and the results are worrying.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.