Your phone’s just sitting there, innocently….
Tabletop image via www.shutterstock.com.
Bad guys or law enforcement could hack into our networked gadgets to spy on everything we do – and it's not clear how a laptop's video camera or an Amazon Echo fits within wiretapping laws.
Australian Prime Minister Malcolm Turnbull announces the federal government’s Cyber Security Strategy today.
AAP Image/Dean Lewins
The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
Cyber crime costs the Australian economy millions of dollars a year.
Cyber security is now a priority for the government, with $230 million committed to its new Cyber Security Strategy. But is it enough?
Insecurity by design, as the FBI or UK government would have it, is pouring petrol on an already raging fire.
A 360 of a hackathon in full flight.
Hackathons are all the rage, but if the participants follow through on the results, they can be a powerful instrument for generating innovation.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough?
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
Your broadband router might not look like much, but it’s your first line of defence against cyber attack.
Matt J Newman/Flickr
New research has found the firmware that runs most broadband routers is years out of date and riddled with potential security holes.
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
Trouble at the BOM.
There are reports that China-based hackers have compromised the Bureau of Meteorology. If so, what would this mean for the BOM and government security?
Your laptop needs you!
Cyberwarfare may be of growing importance, but some foes must be tackled with more low-tech weapons.
Blocking IS one click at a time?
Anonymous strives to bring down IS propaganda before it reaches the masses.
Doing something about online security would be best. But talking about it is a good start.
There are a few things you can do to keep yourself safe online.
Getting the basics of cybersecurity right could eliminate 85% of the threats overnight. Here are some tips to get you started.
Cyber criminals have found a way to harvest data from iPhones and iPads using the weak point in Apple's otherwise top security system - app developers.
Apple’s ‘walled garden’ might be frustrating, but it does protect your devices from being hacked.
Jailbreaking your iOS device can free you from Apple's 'walled garden', but it's a Wild West beyond the walls.
Giving away the keys to cybercriminals.
Intel Free Press/flickr
Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. There are a number of surprising observations…
A biohack event called Rock’n Roll BioTech, held at Aalto University in Helsinki, brings people together to learn about the fundamentals of molecular life-sciences outside of conventional circles.
There's a new counter-culture movement that is seeking to bypass the bureaucracy of science and hack biology for the benefit of the masses.
caught by Captblack76/shutterstock.com
While fallout from the Ashley Madison hack continues to spread, it's worth remembering that views on infidelity have not always been so severe.
Many people might be in trouble care of the Ashley Madison hack.
If the Ashley Madison hack was an inside job, then it shows that even strong protection against outside attacks isn't necessarily enough to prevent a leak of private data.