Numerous cyber attacks in recent years have targeted common household devices, such as routers.
A vigilant public is a necessary component in our collective security strategy against cyber attacks.
Which hat would you wear?
The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.
It’s software: There’s always a way in.
BeeBright via shutterstock.com
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Not all hackers can be bad for an organisation: the white hat or ethical hacker can help.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
Vladimir Putin, here with French President Francois Hollande, has big plans for Europe.
Kremlin Press Office
The Kremlin wants to build strong alliances with "pro-Russian" forces in the West. In France's upcoming election, Putin is placing his bets on two right-wing candidates for president.
Looking deep into computer activities.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of 'hacker ethics' values such as privacy and free speech.
If only it were this easy.
'Keyboard' via shutterstock.com
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
The Australian government is vulnerable to cyberattacks, report says.
Here are some things Australia should do to protect itself from an increasingly weaponised internet.
Need you announce you’ve been hacked? The clock is ticking.
Woman with clock and megaphone via shutterstock.com
LinkedIn, MySpace, Yahoo: Why does it take such a long time for companies to disclose that they have been hacked?
Russia is pressing its national interests online.
Flags and keyboard via shutterstock.com
The FBI is warning of Russian cyberattackers probing American election systems. Information warfare scholars discuss Russia's digital efforts to benefit its national interests.
Are online black markets this direct?
Hands exchanging money via shutterstock.com
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Cyber attacks represent a significant threat to Australia’s civil infrastructure.
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Anonymous can do more harm than good in its war on Islamic State.
The Anonymous hacktivist group engaged in an online war against Islamic State may be doing more harm than good.
Anonymous wants to make sure militant Islamist propaganda video, like this being filmed in Syria, doesn’t make it online.
ISIS uses the internet, especially social media, to propagandize and recruit. Members of hacker group Anonymous have turned their sights on these accounts.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
Is it a crime scene or just a store checkout? Could be both.
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
When all your appliances are internet-enabled, whose hands are holding the remote control?
Hands image via www.shutterstock.com.
An ever-increasing number of our consumer electronics is internet-connected. We’re living at the dawn of the age of the Internet of Things. Appliances ranging from light switches and door locks, to cars…