The Australian government is vulnerable to cyberattacks, report says.
Here are some things Australia should do to protect itself from an increasingly weaponised internet.
Should one person lead two different government agencies?
U.S. government images
The key factor to consider is not cooperation, but rather focus: One is an offensive military unit and the other a defensive civilian agency.
Russia is pressing its national interests online.
Flags and keyboard via shutterstock.com
The FBI is warning of Russian cyberattackers probing American election systems. Information warfare scholars discuss Russia's digital efforts to benefit its national interests.
Apple didn’t know about the vulnerability until the iPhone hack.
Rich rewards are on offer to people who can help private companies develop software to exploit vulnerabilities in technology such as smartphones. It might be legal but is it ethical?
China may be undertaking more cyber attacks than the Australian government has admitted.
It's no surprise that China represents a cyber threat to Australia. But the government has been reluctant to state this fact and needs to respond more decisively.
What really caused the Census servers to crash?
The evidence the Census servers suffered a DDoS attack is weak. A simpler explanation is that they buckled under load of Australians filling out their Census forms as asked.
How the internet has made us terrifyingly vulnerable.
Online fraud is now the most common type of crime, so what should the police and tech firms do to put a stop to these often invisible attacks.
Cyber attacks represent a significant threat to Australia’s civil infrastructure.
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia.
The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
Anonymous can do more harm than good in its war on Islamic State.
The Anonymous hacktivist group engaged in an online war against Islamic State may be doing more harm than good.
How secure are your passwords?
No matter how many times people are warned to set strong secure passwords, many don't. So why do people take the risk? And is there anything else they can do to be more secure online?
Official U.S. Air Force/Flickr
A new report on the future of humanity explains what we really need to be worrying about over the next 35 years.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are.
If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Claims that a cybersecurity expert hacked an aeroplane's cockpit might not be as unbelievable as they first seem.
There's no excuse for big firms letting basic attacks compromise their customers' data.