As companies make quantum computers available through their cloud services, take a look at what it means for computing to move beyond classical mechanics and into quantum physics.
The Russian cyberthreat goes back over three decades, extends into the country’s educational systems and criminal worlds, and shows no signs of letting up.
People participate in a Pyongyang mass rally held at Kim Il-sung Square.
KCNA/Reuters
Reports of North Korea’s capability of firing nuclear weapons are not the only serious threat to global security. North Korea has also become an aggressive cyber power.
The weak spots are at the ends.
ThamKC/Shutterstock.com
Governments’ efforts to weaken communications security undermine and distract from the need to protect the real weak points in our online communications.
Taking a much closer look at what’s going on inside malware.
MuchMania/Shutterstock.com
How do malware analysts examine software that’s designed to wreak havoc with computers? By using tools that watch software’s inner workings very closely.
Students infiltrate a host computer under the watchful eye of a mentor during a capture the flag exercise.
Richard Matthews
Politics podcast: Graeme Samuel on data governance
Data Governance Australia chairman Graeme Samuel hopes that a self-regulatory code of conduct will raise the standards among data-driven organisations.
Online frauds on credit cards are on the rise especially during holidays.
Mighty Travels/Flickr
In a security update on the threats facing Australia at home and abroad, Malcolm Turnbull will say that an ‘online civil society is as achievable as an offline one’.
Australia’s cybersecurity strategy needs some work.
Bob Mical/Flickr