A recent ransomware attack on the UK electricity system shows this pandemic is also about computer viruses.
Vulnerable websites are popping up as organizations move online during the coronavirus pandemic – and hackers have more time at home alone. The result is more websites falling victim to defacement.
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it's time to change that.
The coronavirus pandemic lays bare the many vulnerabilities created by society’s dependence on the internet. Watch the video to learn more about these issues.
Amazon says it's the "new neighbourhood watch" but Ring may just be another technology that gives police too much data and lets neighbourhoods double down on their biases.
Government privacy commissioners are investigating a data breach at one of Canada's largest medical services companies, after hackers gained access to the personal information of 15 million customers.
Research shows we're pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Drones are now an integral part of defence force capability, from intelligence gathering to unmanned theatre engagement. But what happens if our own technology is turned against us?
The announcement of a systemic attack on the Internet in February 2019 raises the question of the structure and protection of one of the major protocols of the web: the domain name service (DNS).
The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple's reputation for security. But you can fix the problem by updating your phone's software.
Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There's less attention to the dangers of cyberattacks, which could cripple key utilities.
US and Russian tension over power grid cyber attacks is a concern for global stability, but it also highlights our own critical infrastructure vulnerabilities.
The worst-case scenario is that hackers still have access to the university systems via a backdoor and are siphoning off critical data as it emerges.
Julian Assange's indictment under the Espionage Act, a sweeping law with heavy penalties for unauthorized receiving or disclosing of classified information, poses a threat to press freedom.
Two security scares in the past 24 hours should prompt you to make sure your software is up-to-date. But what are the risks?
The latest malware is designed especially to make small companies pay through the nose for their data.
Current techniques to protect biometric details, such as face recognition or fingerprints, from hacking are effective, but advances in AI are rendering these protections obsolete.
Do you receive a code via SMS message, email or voice call to sign into your bank account? This security method is no longer considered very secure.
The danger with car hacking isn't terrorists taking control of your car (as movies might have you think), but the age old problem of dodgy mechanics getting you to spend more on servicing it.
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation38.8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.