As governments look to new ways to step up surveillance, hackers find new ways to subvert it. Is there a way to end this cat and mouse game, described as a crypto-war?
Online fraud is now the most common type of crime, so what should the police and tech firms do to put a stop to these often invisible attacks.
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
If a computer search would qualify for a warrant if its whereabouts were known, why should simply hiding its location make it legally unsearchable?
Imagining possible futures can help us plan a secure information technology environment for the years to come.
We still haven't worked out if cyber security spending is delivering results.
Australia has some way to travel before it graduates to a coherent national cyber security strategy.
The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
Cyber security is now a priority for the government, with $230 million committed to its new Cyber Security Strategy. But is it enough?
Australian public and private sector organisations and individuals are facing malicious cyber activity that is unprecedented in scale and reach, Malcolm Turnbull warns.
It's bad enough when someone loses money to an online scam. But some victims can also recruit others into the scam causing even further heartache and loss of money.
Cyberattacks are on the rise in South Africa. New legislation is important, but it won't solve the problem if it's not accompanied by user education.
There's a simple way to protect your contactless card being swiped in your pocket.
Reports of a drop in the number of people caught in online fraud is to be welcomed. But scammers are already changing their plans to bypass existing safeguards.
Here's how to protect yourself from the latest online scourge of hackers encrypting your files and demanding a ransom to unlock them.
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
2015 was a year where we expanded our view of the universe, embraced new technologies and got a hint of the profound changes to come.
Phishing attempts tend to rise during the festive season when people are more likely to respond to online marketing and to spend more money. How can you protect yourself?
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
Cyber security has been identified as a global challenge, with Africa facing renewed threats through increasing internet use across many platforms.