The modern world depends on critical systems, networks and data repositories that are not as secure as they should be. Breaches will continue until society as a whole makes some big changes.
A roundup of research into what makes passwords secure, and options for new standards of login authentication.
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
US military bases usually get their electricity from the civilian grid, which is vulnerable to attack and to disaster. Solar-powered microgrids could protect national security, and would save money.
Some of the iPhone's innovations have made users less secure.
It's impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It's time to return to plain, text-only email.
Many Australians are unaware of current police and intelligence powers when it comes to accessing our data.
Australia's Therapeutic Goods Administration must learn to deal with software rather than simply bits of metal and plastic.
Without proper checks, police could have significantly expanded scope to search homes and computers around the world.
The companies that make our digital devices think – and act – like they still own them, even after we've bought them. Are we becoming digital serfs?
Support from overseas law enforcement and tech companies is typically a slow and cumbersome process.
Pacemakers are Internet of Things devices for the human body, but they're still not particularly secure.
Recent federal changes to password-strength guidelines echo the findings of research we've been doing. It's time to think differently about what makes a password secure.
It won't be like an army of robots marching in the streets, but AI hacking is on the horizon.
As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.
Modern cars are computers on wheels. We should make sure they're cyber-secure.
The Russian cyberthreat goes back over three decades, extends into the country's educational systems and criminal worlds, and shows no signs of letting up.
Governments' efforts to weaken communications security undermine and distract from the need to protect the real weak points in our online communications.
How do malware analysts examine software that's designed to wreak havoc with computers? By using tools that watch software's inner workings very closely.
Cyber Security Summer School is a chance for researchers to test their skills during live penetration testing.