WikiLeaks claims the CIA has been involved in intensive hacking operations.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
For allies of the United States, the reality of a Donald Trump presidency has just begun to sink in.
How the internet has made us terrifyingly vulnerable.
Is everything on the up-and-up here?
With the DNC email leak and Trump calling on Russia to hack Clinton's emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
Cyber attacks represent a significant threat to Australia’s civil infrastructure.
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia.
The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Cyber weapons are allowing states to attack each other without fear of retaliation. The consequences potentially are devastating.
Cyberwarfare is a threat that is anonymous, hard to trace and hard to defend against.
Keyboard image via shutterstock.com
The openness of the Internet gives an advantage to attackers – but what constitutes an act of war in the electronic world?
Warfare is changing, and our approach to dealing with our adversaries must change too.
Your laptop needs you!
Cyberwarfare may be of growing importance, but some foes must be tackled with more low-tech weapons.
Blocking IS one click at a time?
Anonymous strives to bring down IS propaganda before it reaches the masses.
Cables crisscross the oceans carrying your internet info.
Telegeography Submarine Cable Map
Thin cables about as big around as a garden hose traverse the Earth's oceans carrying all our intercontinental internet data. No one's in charge and no one's defending them.
Increased submarine activity is fuelling concerns at Russia's capability to wage information warfare on the West.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
The divide between 'legal' and illegal hacking is very, very thin.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
Hacking and making a profit isn’t as easy as it looks.
In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
A screenshot from the account while under hostile control.
The Twittersphere is abuzz about the news on Monday that ISIS or their affiliates are suspected of hacking and compromising the US Central Command’s official Twitter account. As of Monday afternoon in…
There’s no physical fences in cyberspace, that doesn’t mean there’s no border controls.
While there is only one world power on the internet, that situation will not last forever. The internet’s underpinning technologies were mostly created in the US, the initial networks were based there…