The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.
The Australian government is vulnerable to cyberattacks, report says.
Here are some things Australia should do to protect itself from an increasingly weaponised internet.
Need you announce you’ve been hacked? The clock is ticking.
Woman with clock and megaphone via shutterstock.com
LinkedIn, MySpace, Yahoo: Why does it take such a long time for companies to disclose that they have been hacked?
Russia is pressing its national interests online.
Flags and keyboard via shutterstock.com
The FBI is warning of Russian cyberattackers probing American election systems. Information warfare scholars discuss Russia's digital efforts to benefit its national interests.
Are online black markets this direct?
Hands exchanging money via shutterstock.com
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Cyber attacks represent a significant threat to Australia’s civil infrastructure.
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Anonymous can do more harm than good in its war on Islamic State.
The Anonymous hacktivist group engaged in an online war against Islamic State may be doing more harm than good.
Anonymous wants to make sure militant Islamist propaganda video, like this being filmed in Syria, doesn’t make it online.
ISIS uses the internet, especially social media, to propagandize and recruit. Members of hacker group Anonymous have turned their sights on these accounts.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
Is it a crime scene or just a store checkout? Could be both.
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
When all your appliances are internet-enabled, whose hands are holding the remote control?
Hands image via www.shutterstock.com.
An ever-increasing number of our consumer electronics is internet-connected. We’re living at the dawn of the age of the Internet of Things. Appliances ranging from light switches and door locks, to cars…
Making hackers happy.
Over the past few months, the Android platform developed by Google and based on the Linux operating system has been having a difficult time. Hackers, with malicious intent and those without, have been…