What constitutes cyberwar?
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
The US has charged and sanctioned nine Iranians and an Iranian company for cyber attacks.
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
Countries affected by prolonged periods of cyber warfare need peacekeeping assistance to recover.
Hackers will start to get help from robots and artificial intelligence soon.
It won't be like an army of robots marching in the streets, but AI hacking is on the horizon.
The Information Warfare Division will require much broader skill sets than typically associated with defence force personnel.
The Australian Defence Force's new Information Warfare Division will require time and political capital to shape a capable workforce.
WikiLeaks claims the CIA has been involved in intensive hacking operations.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
For allies of the United States, the reality of a Donald Trump presidency has just begun to sink in.
How the internet has made us terrifyingly vulnerable.
Is everything on the up-and-up here?
With the DNC email leak and Trump calling on Russia to hack Clinton's emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
Cyber attacks represent a significant threat to Australia’s civil infrastructure.
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia.
The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Cyber weapons are allowing states to attack each other without fear of retaliation. The consequences potentially are devastating.
Cyberwarfare is a threat that is anonymous, hard to trace and hard to defend against.
Keyboard image via shutterstock.com
The openness of the Internet gives an advantage to attackers – but what constitutes an act of war in the electronic world?
Warfare is changing, and our approach to dealing with our adversaries must change too.
Your laptop needs you!
Cyberwarfare may be of growing importance, but some foes must be tackled with more low-tech weapons.
Blocking IS one click at a time?
Anonymous strives to bring down IS propaganda before it reaches the masses.
Cables crisscross the oceans carrying your internet info.
Telegeography Submarine Cable Map
Thin cables about as big around as a garden hose traverse the Earth's oceans carrying all our intercontinental internet data. No one's in charge and no one's defending them.
Increased submarine activity is fuelling concerns at Russia's capability to wage information warfare on the West.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…