Hacking

Displaying 1 - 20 of 101 articles

Your phone’s just sitting there, innocently…. Tabletop image via www.shutterstock.com.

Your devices' latest feature? They can spy on your every move

Bad guys or law enforcement could hack into our networked gadgets to spy on everything we do – and it's not clear how a laptop's video camera or an Amazon Echo fits within wiretapping laws.
Australian Prime Minister Malcolm Turnbull announces the federal government’s Cyber Security Strategy today. AAP Image/Dean Lewins

Individuals not the priority in the Cyber Security Strategy

The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough? Colin

Why the IRS was just hacked – again – and what the feds can do about it

Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
The fingerprints might indicate China, but that’s not so easy to prove. Shutterstock

How we trace the hackers behind a cyber attack

This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
A biohack event called Rock’n Roll BioTech, held at Aalto University in Helsinki, brings people together to learn about the fundamentals of molecular life-sciences outside of conventional circles. GaudiLabs

Hacking the body: the scientific counter-culture of the DIYbio movement

There's a new counter-culture movement that is seeking to bypass the bureaucracy of science and hack biology for the benefit of the masses.
Many people might be in trouble care of the Ashley Madison hack. lucyburrluck/Flickr

What if the Ashley Madison hack was an inside job?

If the Ashley Madison hack was an inside job, then it shows that even strong protection against outside attacks isn't necessarily enough to prevent a leak of private data.

Top contributors

More