The Australian government's cybersecurity report card is out and the results are worrying.
Simply updating and patching an organisation's computer software may not be enough to fend off another cyber attack. You could engage an ethical hacker to help out.
Small businesses are the forgotten casualties of the recent WannaCry ransomware attack.
The underground market for software vulnerabilities has been growing steadily since the 1990s, so the latest WannaCry could be a sign of things to come.
Cybercriminals are using cloud-based services, much like regular businesses. A new study reveals important lessons for the future of fighting cybercrime.
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
Nigeria’s cybercrime has been rated the third worst in the world primarily for ‘419’ fraud occurrences but the term encompasses a wide range of crimes, some more common in western nations.
Information warfare is a clear and present danger.
The darknet, like the open internet, is not immune from illegal activity. But many darknet users are there in search of 'hacker ethics' values such as privacy and free speech.
The deep and dark web can be a scary place, but modern open-source technologies funded by the Defense Department can help explore it.
The biggest cyber security concern for many Tanzanians is the risk of inadvertently becoming a perpetrator of politically-defined cybercrime, rather than becoming a victim
LinkedIn, MySpace, Yahoo: Why does it take such a long time for companies to disclose that they have been hacked?
By 2020, the cybersecurity industry will need 1.5 million more workers than will be qualified for jobs. What's the solution? Getting high school and college students excited about the industry.
Telling girls and young women to 'be careful what images you share' contributes to the shaming and humiliation of victims by placing the responsibility back onto them for their own humiliation.
As governments look to new ways to step up surveillance, hackers find new ways to subvert it. Is there a way to end this cat and mouse game, described as a crypto-war?
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
Imagining possible futures can help us plan a secure information technology environment for the years to come.
Australia has some way to travel before it graduates to a coherent national cyber security strategy.
The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.