Cyberwarfare is a threat that is anonymous, hard to trace and hard to defend against.
Keyboard image via shutterstock.com
The openness of the Internet gives an advantage to attackers – but what constitutes an act of war in the electronic world?
The US government is asking Apple to effectively hack it’s own phone.
Shutterstock
If Apple concedes to the US government’s request to hack its own product, it could end up undermining security and privacy for all of us.
Selfie shopping.
Shutterstock
Plans to introduce voice and facial recognition technology for online shopping and banking point to a password-free future.
Who’s got the keys to the door?
ymgerman/shutterstock.com
If our homes and property are protected from the law, by the law, then our digital devices should be, too.
Apple CEO Tim Cook standing firm.
EPA/Monica Davey
Apple is pushing back against the FBI’s order to decrypt the iPhone of San Bernardino gunman Syed Rizwan Farook for the sake of privacy and security.
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough?
Colin
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
Hack attack.
Wikipedia
The battle between personal privacy and national security online continues.
An out of date operating system can let the hackers in to your computer network.
Flickr/Don Hankins
Microsoft warned back in 2014 that anyone continuing to use Windows XP, once it ended support, would be vulnerable to attack. So why are some organisations still using the old operating system?
Malcolm Turnbull strongly backed Barack Obama’s calls for Congress to pass the Trans-Pacific Partnership agreement.
Michael Reynolds/EPA
Malcolm Turnbull has directly lobbied United States legislators to pass the Trans-Pacific Partnership agreement.
Could the hack that took out the power grid in Ukraine happen in the U.S.?
rainchurch/flickr
Malware has brought down the power grid in the Ukraine. What were attackers after and could it happen elsewhere?
Steag/VGB Power Tech GmbH
The cyberattack that brought down a city’s power supply in Ukraine is a cautionary tale for what lies ahead.
Western governments are threatening to undermine the encryption that keeps our online communications private.
Shutterstock
An open letter signed by security experts from around the world is calling on governments to protect encryption rather than undermine it in a quixotic attempt to tackle terrorism.
Your broadband router might not look like much, but it’s your first line of defence against cyber attack.
Matt J Newman/Flickr
New research has found the firmware that runs most broadband routers is years out of date and riddled with potential security holes.
Trouble at the BOM.
flickr Tatters
There are reports that China-based hackers have compromised the Bureau of Meteorology. If so, what would this mean for the BOM and government security?
edublogger
Doing something about online security would be best. But talking about it is a good start.
Phishing is a growing problem across Africa. South Africa has the highest number of victims.
shutterstock
Cyber security has been identified as a global challenge, with Africa facing renewed threats through increasing internet use across many platforms.
This man won’t keep you safe.
Britta Pedersen/EPA
James Bond and his ilk are out-dated. Better understanding and sharing of data will save more lives than spies.
Bond ambition.
Sony
In a world where the gadgets have taken over, Bond feels somewhat antiquated but he is inevitably privileged by the demands of cinema.
mozakim/shutterstock.com
UK plc has a cybersecurity mountain to climb.
Stefan Wermuth/Reuters
Strange calls, emails, or disappearing bank balances – how online criminals use stolen card details.