A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Prime Minister Malcolm Turnbull presents the defence white paper at the Australian Defence Force Academy in Canberra.
The Turnbull government’s defence white paper identifies key risks to Australia’s security environment in the next two decades.
Defence Minister Marise Payne inherited a draft of the defence white paper last year, but wanted to put her own stamp on it.
The defence white paper will pledge an additional $29.9 billion in defence spending over the coming decade and support for businesses to innovate in areas such as cyber security and aeronautics.
Plans to introduce voice and facial recognition technology for online shopping and banking point to a password-free future.
An out of date operating system can let the hackers in to your computer network.
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
Malcolm Turnbull strongly backed Barack Obama’s calls for Congress to pass the Trans-Pacific Partnership agreement.
Malcolm Turnbull has directly lobbied United States legislators to pass the Trans-Pacific Partnership agreement.
Your broadband router might not look like much, but it’s your first line of defence against cyber attack.
Matt J Newman/Flickr
New research has found the firmware that runs most broadband routers is years out of date and riddled with potential security holes.
This man won’t keep you safe.
James Bond and his ilk are out-dated. Better understanding and sharing of data will save more lives than spies.
Cyber criminals have found a way to harvest data from iPhones and iPads using the weak point in Apple's otherwise top security system - app developers.
How secure are your passwords?
No matter how many times people are warned to set strong secure passwords, many don't. So why do people take the risk? And is there anything else they can do to be more secure online?
Which operating system is safer from a hack attack?
The argument has been raging for years: which operating system is the safest when it comes to security. Has the latest software upgrades from the tech giants changed anything?
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
In what has been labelled as poetic justice by some, the Hacking Team, an Italian company that sells mass computer and mobile device surveillance software has itself been hacked. The alleged hackers, tweeting…
National priorities can help focus our research efforts.
AAP Image/Lukas Coch
The nine science and research priorities will help focus and coordinate our efforts, and aid government departments in supporting the future of Australian science.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
More than just a cyber “whodunnit.”
Lee Jae Won/Reuters
Many questions remain about the hack on government employee data but the US has to treat the data theft as a high-level diplomatic incident.
The security breach of the Office of Personnel Management (OPM) demonstrates governments have a lot to learn about protecting their documents from cyber attacks.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Claims that a cybersecurity expert hacked an aeroplane's cockpit might not be as unbelievable as they first seem.
There's no excuse for big firms letting basic attacks compromise their customers' data.