A new type of computer means we'll need a new way to make our data secure.
PHOTOCREO Michal Bednarek/Shutterstock.com
A sufficiently talented brainjacker could one day influence the behaviour of a person in worrying ways.
Cybersecurity just got even more difficult.
The top cyberspy agency couldn't stay immune from attacks forever. What does it mean for governments, companies and internet users as a whole that the NSA has been hacked?
This is the screen that greeted many Australians on Census night, 9 August 2016.
Despite assuring Australians its systems were load tested and secure, the Census site went offline at a crucial time. Could the ABS have avoided such an embarrasing failure?
The ABS promises it has the best of intentions, but many don’t trust it.
The backlash against the Census suggests the Australian Bureau of Statistics didn't do enough to convince Australians it needed to collect their private information or that it'd be kept safe.
Is everything on the up-and-up here?
With the DNC email leak and Trump calling on Russia to hack Clinton's emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
Are online black markets this direct?
Hands exchanging money via shutterstock.com
What happens after a data breach? What does an attacker do with the information collected? And who wants it, anyway?
Believe it or not but ‘123456’ and ‘password’ are still used by people today as passwords.
Tech giant Microsoft wants to rid the world of "dumb" passwords to improve online security. But maybe it's the password itself we should dump.
Your mobile number is all a hacker needs to read your texts, listen to your calls and even track your whereabouts.
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia.
The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Your phone’s just sitting there, innocently….
Tabletop image via www.shutterstock.com.
Bad guys or law enforcement could hack into our networked gadgets to spy on everything we do – and it's not clear how a laptop's video camera or an Amazon Echo fits within wiretapping laws.
Australian Prime Minister Malcolm Turnbull announces the federal government’s Cyber Security Strategy today.
AAP Image/Dean Lewins
The Australian Government's Cyber Security Strategy appears to be a mixed bag when it comes to protecting your personal information.
Cyber crime costs the Australian economy millions of dollars a year.
Cyber security is now a priority for the government, with $230 million committed to its new Cyber Security Strategy. But is it enough?
Insecurity by design, as the FBI or UK government would have it, is pouring petrol on an already raging fire.
A 360 of a hackathon in full flight.
Hackathons are all the rage, but if the participants follow through on the results, they can be a powerful instrument for generating innovation.
A man displays a protest message on his iPhone at a rally in support of Apple’s refusal to help the FBI access the iPhone of a shooter involved in San Bernardino mass killing.
Now that Apple has refused to build a backdoor into its own device, should the FBI turn to ethical hackers to gain access to a terror suspect's iPhone?
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough?
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
Your broadband router might not look like much, but it’s your first line of defence against cyber attack.
Matt J Newman/Flickr
New research has found the firmware that runs most broadband routers is years out of date and riddled with potential security holes.
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
Trouble at the BOM.
There are reports that China-based hackers have compromised the Bureau of Meteorology. If so, what would this mean for the BOM and government security?