Dozens of countries and hundreds of firms and nonprofits are fed up with digital violence and are working toward greater cybersecurity for all.
Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There's less attention to the dangers of cyberattacks, which could cripple key utilities.
A defender that can hold out while inflicting greater losses on its attacker can wear down an adversary – reducing the threat of additional attacks.
US and Russian tension over power grid cyber attacks is a concern for global stability, but it also highlights our own critical infrastructure vulnerabilities.
Cyber attacks are becoming part of traditional warfare, but who should be targeted in response and what force should be used?
Countries may be forced to choose whether they side with the US or China when it comes to Huawei.
A new strategy for U.S. Cyber Command seeks to block enemies from achieving their objectives – but may not be successful, and could have unforeseen consequences.
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation38.8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Bill Shorten said party political structures were perhaps more vulnerable than government institutions - and progressive parties particularly so.
Cyber attacks need two components – the tools to exploit vulnerabilities and the people with the expertise to deploy them.
Despite the uncertainties – and dangers – of retaliating against suspected cyberattackers, a surprising number of companies and countries are exploring doing just that.
The UK has become surprisingly willing to brief the press about possible use of cyber attacks, including against Russia in response to the Skripal attack.
Cybersecurity experts in the US knew about Russian intelligence agencies' activities, but may not have had any idea how comprehensive and integrated they were – until now.
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
Simulation models show just how effectively fake news and propaganda can shift opinions.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
The government wants Australia to grow defence exports 800% by 2028. Investing in the cyber industry may be the only way to get there.
Countries affected by prolonged periods of cyber warfare need peacekeeping assistance to recover.
As tensions between the US and Russia escalate, both sides are developing technological capabilities, including artificial intelligence that could be used in conflict.
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.