The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.
To protect ourselves online, we should all understand a few key terms.
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
If security advice from government agencies doesn't ring true, customers won't take it – which puts us all at risk.
The Kremlin wants to build strong alliances with "pro-Russian" forces in the West. In France's upcoming election, Putin is placing his bets on two right-wing candidates for president.
Cyberdetectives look for digital doors or windows left unlocked, find electronic footprints in the dirt and examine malicious software for clues about who broke in, what they took and why.
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of 'hacker ethics' values such as privacy and free speech.
As gig work transitions online, knowing how to protect yourself and your devices has never been more important.
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
Here are some things Australia should do to protect itself from an increasingly weaponised internet.
LinkedIn, MySpace, Yahoo: Why does it take such a long time for companies to disclose that they have been hacked?
The FBI is warning of Russian cyberattackers probing American election systems. Information warfare scholars discuss Russia's digital efforts to benefit its national interests.
It's true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
Your mobile number is all a hacker needs to read your texts, listen to your calls and even track your whereabouts.
Online activism now means creating alternative ways to work, communicate and protest.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?