What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Tech giant Microsoft wants to rid the world of "dumb" passwords to improve online security. But maybe it's the password itself we should dump.
Your mobile number is all a hacker needs to read your texts, listen to your calls and even track your whereabouts.
The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Bad guys or law enforcement could hack into our networked gadgets to spy on everything we do – and it's not clear how a laptop's video camera or an Amazon Echo fits within wiretapping laws.
The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
Cyber security is now a priority for the government, with $230 million committed to its new Cyber Security Strategy. But is it enough?
Insecurity by design, as the FBI or UK government would have it, is pouring petrol on an already raging fire.
Hackathons are all the rage, but if the participants follow through on the results, they can be a powerful instrument for generating innovation.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
New research has found the firmware that runs most broadband routers is years out of date and riddled with potential security holes.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
There are reports that China-based hackers have compromised the Bureau of Meteorology. If so, what would this mean for the BOM and government security?
Cyberwarfare may be of growing importance, but some foes must be tackled with more low-tech weapons.
Anonymous strives to bring down IS propaganda before it reaches the masses.
Doing something about online security would be best. But talking about it is a good start.
Getting the basics of cybersecurity right could eliminate 85% of the threats overnight. Here are some tips to get you started.
Cyber criminals have found a way to harvest data from iPhones and iPads using the weak point in Apple's otherwise top security system - app developers.
Jailbreaking your iOS device can free you from Apple's 'walled garden', but it's a Wild West beyond the walls.