The US could help solve a global security problem and boost its image abroad by helping willing experts share their cybersecurity knowledge around the country and the globe.
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cybercrime affects individuals and families as they navigate online life. But significant efforts focus instead on cybersecurity, protecting institutional networks and systems – rather than people.
Scanning physical items constructed with nefarious intent can introduce malware into a smartphone or computer.
The states' handover of driver licence data for a beefed up national facial biometric matching capability would only bring existing arrangements into 'real time'.
The cyberthreat from China is one more of espionage than destruction. And it's changing – perhaps even lessening.
There are technical reasons companies can be slow to update software, but as seen in the Equifax hack, a key problem is management.
The modern world depends on critical systems, networks and data repositories that are not as secure as they should be. Breaches will continue until society as a whole makes some big changes.
A roundup of research into what makes passwords secure, and options for new standards of login authentication.
While security researchers are yet to perform a thorough analysis of iOS 11 and Face ID, past issues with the hardware and software of the iPhone point to areas of potential concern.
US military bases usually get their electricity from the civilian grid, which is vulnerable to attack and to disaster. Solar-powered microgrids could protect national security, and would save money.
Some of the iPhone's innovations have made users less secure.
It's impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It's time to return to plain, text-only email.
Many Australians are unaware of current police and intelligence powers when it comes to accessing our data.
Australia's Therapeutic Goods Administration must learn to deal with software rather than simply bits of metal and plastic.
Without proper checks, police could have significantly expanded scope to search homes and computers around the world.
The companies that make our digital devices think – and act – like they still own them, even after we've bought them. Are we becoming digital serfs?
Support from overseas law enforcement and tech companies is typically a slow and cumbersome process.
Pacemakers are Internet of Things devices for the human body, but they're still not particularly secure.
Recent federal changes to password-strength guidelines echo the findings of research we've been doing. It's time to think differently about what makes a password secure.