We want your data.
gualtiero boffi / Shutterstock.com
The rate at which valuable identity information is flying out of the control of firms is alarming -- more than 3,500 records per minute.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
The way we talk about cyberspace may make us more vulnerable to hacking.
Cars are effectively becoming computers on wheels – and very attractive to cyber criminals.
People participate in a Pyongyang mass rally held at Kim Il-sung Square.
Reports of North Korea's capability of firing nuclear weapons are not the only serious threat to global security. North Korea has also become an aggressive cyber power.
Online frauds on credit cards are on the rise especially during holidays.
Cyber financial crime is on the rise globally. Here's how you can stay safe.
Ritchie B Tongo/EPA
Small businesses are the forgotten casualties of the recent WannaCry ransomware attack.
‘No, I absolutely do not wish to change my password, thanks.’
If security advice from government agencies doesn't ring true, customers won't take it – which puts us all at risk.
The solider of Tallinin, a bronze statue that triggered the first recognised cyber attack.
A decade after the first coordinated cyber attack, the players might be the same, but cyber operations have changed dramatically.
How’s this setting?
When it comes to smart vibrators, be sure to use data protection.
How much data do you still store only on your mobile, tablet or laptop?
We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
A way in for government would also allow hackers access.
Using sound waves to disrupt sensor functions is just one of a growing number of "side-channel attacks" that could affect our devices.
Phishing for information and money.
You know it's a serious problem when even Google and Paypal have been targeted.
Changes to the way some organisations must reveal a data breach on personal information.
New legislation will soon require organisations to disclose any data breaches involving your private details. But the legislation still has some gaps in it.
The latest WikiLeaks revelation shows how far the CIA can take its cyber attacks.
WikiLeaks claims the CIA has been involved in intensive hacking operations.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
How secure are you?
As gig work transitions online, knowing how to protect yourself and your devices has never been more important.
The newly created Critical Infrastructure Centre could assist overseas investors on whether they should bid for critical assets like ports.
The new Critical Infrastructure Centre might provide clarity on certain projects but it doesn't resolve the ongoing debate on what approach the government should take with foreign investment.
Smartphones and other devices are popular in indigenous communities throughout Australia.
Cyber safety can mean a different thing for those living in remote Indigenous communities, and it needs to be managed carefully.