How secure are you?
As gig work transitions online, knowing how to protect yourself and your devices has never been more important.
The newly created Critical Infrastructure Centre could assist overseas investors on whether they should bid for critical assets like ports.
The new Critical Infrastructure Centre might provide clarity on certain projects but it doesn't resolve the ongoing debate on what approach the government should take with foreign investment.
Smartphones and other devices are popular in indigenous communities throughout Australia.
Cyber safety can mean a different thing for those living in remote Indigenous communities, and it needs to be managed carefully.
There will soon be billions of connected smart devices, and they could be turned against us.
A recent massive distributed denial-of-service attack by compromised Internet of Things devices highlights a growing cyber security threat.
At the UN next week Malcolm Turnbull will be among many leaders responding to the large movements of refugees and migrants across the world.
Apple didn’t know about the vulnerability until the iPhone hack.
Rich rewards are on offer to people who can help private companies develop software to exploit vulnerabilities in technology such as smartphones. It might be legal but is it ethical?
The new Equinix SY4 data centre in Alexandria sure doesn’t look like a cloud from the outside.
Without data centres the world stops. We explored the inner Sydney suburb of Alexandria to learn more about these critical infrastructures.
The Spy Files, released by WikiLeaks, revealed the scale of surveillance going on around the world.
The Australian Broadcasting Corporation’s Four Corners’ Cyber War program, aired tonight, highlighted the personal, commercial and national threats posed by hackers and a general preparedness on all things…
China may be undertaking more cyber attacks than the Australian government has admitted.
It's no surprise that China represents a cyber threat to Australia. But the government has been reluctant to state this fact and needs to respond more decisively.
A new type of computer means we'll need a new way to make our data secure.
By hand: voters use paper and pencil to cast their ballots in the 2016 Australian federal election.
There's something about seeing the ballot process take place – the vote, the count – that inspires confidence. That wouldn't be the same with any electronic voting system.
Believe it or not but ‘123456’ and ‘password’ are still used by people today as passwords.
Tech giant Microsoft wants to rid the world of "dumb" passwords to improve online security. But maybe it's the password itself we should dump.
It’s not the first time attempts have been made to block WhatsApp in Brazil.
It's a battle of online privacy versus a crackdown on crime, but is a total ban on the popular app, WhatsApp, the right way to go?
Governments worldwide appear to be escalating a hacking arms race.
We still haven't worked out if cyber security spending is delivering results.
Australian Prime Minister Malcolm Turnbull announces the federal government’s Cyber Security Strategy today.
AAP Image/Dean Lewins
The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
Cyber crime costs the Australian economy millions of dollars a year.
Cyber security is now a priority for the government, with $230 million committed to its new Cyber Security Strategy. But is it enough?
Malcolm Turnbull says businesses and governments must better educate and empower employees to use sound practices online.
Australian public and private sector organisations and individuals are facing malicious cyber activity that is unprecedented in scale and reach, Malcolm Turnbull warns.
Internet connected devices like webcams are the tip of the iceberg when it comes to the Internet of Things.
Millions of new devices are going online as the Internet of Things expands. But many have security or privacy holes. Here's what to look for to keep yourself safe online.
Cybercriminals take advantage of computer users’ lack of education about their methods.
Cyberattacks are on the rise in South Africa. New legislation is important, but it won't solve the problem if it's not accompanied by user education.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?