Articles on Hacking

Displaying 81 - 100 of 195 articles

Seeking a peaceful handover of power between parties and political opponents. Jim Young/Reuters

Election legitimacy at risk, even without a November cyberattack

It's true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
Cybersecurity risks increase with the amount of outsourcing a company does. Dave Hunt/AAP

Business Briefing: hack-proof, how business can stay ahead in cybersecurity

Business Briefing: hack-proof, how business can stay ahead in cybersecurity. The Conversation15.3 MB (download)
Businesses are going about cybersecurity the wrong way and need to go back to the question: what are you trying to protect?
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia. Army-Cyber/flickr

America is ‘dropping cyberbombs’ – but how do they work?

The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Your phone’s just sitting there, innocently…. Tabletop image via www.shutterstock.com.

Your devices’ latest feature? They can spy on your every move

Bad guys or law enforcement could hack into our networked gadgets to spy on everything we do – and it's not clear how a laptop's video camera or an Amazon Echo fits within wiretapping laws.
Australian Prime Minister Malcolm Turnbull announces the federal government’s Cyber Security Strategy today. AAP Image/Dean Lewins

Individuals not the priority in the Cyber Security Strategy

The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing. REUTERS/Lucy Nicholson

Hacking the terror suspect’s iPhone: what the FBI can do now Apple says ‘no’

Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?

Top contributors

More