Securing our voting systems to defend against hacks is vital but challenging.
Scammers have exploited a simple weakness in the myGov online portal to redirect hundreds of millions of dollars in tax refunds.
AI could allow cybercriminals to operate with greater efficiency, targeting more people at once.
Cybercriminals are attempting to monetise the hacking techniques used by state actors.
Banning TikTok: What data privacy risk does the app pose, and what could the Chinese government do with data it collects? And is it even possible to ban an app?
School officials are becoming increasingly wary of TikTok amid concerns that the app poses a risk to student safety and privacy and makes the nation vulnerable to spies.
Optus used press releases, and Twitter when it could have contacted its customers by text.
From tractors to smartphones, consumers may own their devices but the manufacturers still often hold the keys.
Cyberattacks demanding ransoms for the release of information are on the rise. To determine if they should pay, businesses need to think about how they would react in such a scenario.
“Hackathons” can imply breaching security and privacy. To more accurately reflect their creative and constructive intent, they can be referred to instead as “datathons” or “code fests.”
Many organisations abide by a “zero trust” rule wherein absolute trust is placed in nothing, apart from a central identity and access management system. But what happens when this system is breached?
The social media strategies of many parties and candidates aim to bypass mainstream media to speak directly to voters, but they are often not as sophisticated as is assumed.
Cryptocurrency allows Ukraine to get quick financial support, and Russia, to bypass international sanctions and protect some of its economic interests.
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
This deceptively simple online word guessing game has captured the English-speaking world.
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.
A UN working group on cybersecurity is making incremental progress in highlighting the importance of including and protecting civilians.
We believe fitness trackers keep us healthy, and connected toys keep children safe – but such devices are easily abused.