How can investigators get into digital files?
Sherlock Holmes and computer via shutterstock.com
The technical consensus is clear: Adding 'backdoors' to encryption algorithms weakens everyone's security. So what are the police and intelligence agencies to do?
The latest WikiLeaks revelation shows how far the CIA can take its cyber attacks.
The world is searching – will we protect ourselves?
Graphic via shutterstock.com
The latest release from WikiLeaks, of information about CIA hacking efforts, is yet another reminder of how Americans and our government must better protect our secret information.
WikiLeaks claims the CIA has been involved in intensive hacking operations.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Members of French presidential candidate Emmanuel Macron’s team have accused Russia of hacking the campaign.
Russia could undermine the idea of a shared European reality and sway three elections key to the future of the bloc.
U.S. President Donald Trump speaks by phone with Russia’s President Vladimir Putin.
Research on more than 50 government investigations reveals how partisanship can get in the way of finding answers we all agree on.
Digital information should be private and secure.
Digital communications via shutterstock.com
Recent developments at the United Nations and the G-20 suggest that the well-known human rights to privacy and freedom of expression may soon be formally extended to online communications.
Russia has been accused of interfering in the recent US presidential election.
The prospect of foreign hackers interfering with democracy is not just an American story. It could happen in Australia too, and we need to guard against it.
The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
It’s all fun until someone gets hacked.
Prime Minister Malcolm Turnbull and senior ministers have been criticised over their use of WhatsApp, which can leave users vulnerable if their phones are hacked, attacked by malware, or simply stolen.
The Australian government is vulnerable to cyberattacks, report says.
Here are some things Australia should do to protect itself from an increasingly weaponised internet.
There will soon be billions of connected smart devices, and they could be turned against us.
A recent massive distributed denial-of-service attack by compromised Internet of Things devices highlights a growing cyber security threat.
Open-source code can be a literal lifesaver.
When lives are at stake, there's no time for secrecy. Just publish the code.
Need you announce you’ve been hacked? The clock is ticking.
Woman with clock and megaphone via shutterstock.com
LinkedIn, MySpace, Yahoo: Why does it take such a long time for companies to disclose that they have been hacked?
Apple didn’t know about the vulnerability until the iPhone hack.
Rich rewards are on offer to people who can help private companies develop software to exploit vulnerabilities in technology such as smartphones. It might be legal but is it ethical?
A new Russian hack has claimed to reveal the details of so-called therapeutic use exemptions. But could transparency in this area be a benchmark for the fight against drugs in sport?
Seeking a peaceful handover of power between parties and political opponents.
It's true that sophisticated hackers may be able to tilt the presidential election. But the more likely threat to democracy comes from sore losers who sow doubt about voting integrity.
Cybersecurity risks increase with the amount of outsourcing a company does.
Business Briefing: hack-proof, how business can stay ahead in cybersecurity.
The Conversation 15.3 MB (download)
Businesses are going about cybersecurity the wrong way and need to go back to the question: what are you trying to protect?
China may be undertaking more cyber attacks than the Australian government has admitted.
It's no surprise that China represents a cyber threat to Australia. But the government has been reluctant to state this fact and needs to respond more decisively.
A new type of computer means we'll need a new way to make our data secure.