Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
It's possible that hackers could have infiltrated and spied on Boris Johnson's personal phone from as early as 2006.
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
Cyber attacks have created new dilemmas for philosophers who determine the ethics of war.
Commercial software is vital to all of our cybersecurity. What should governments do if they find it has weaknesses?
Fragmented authority for national cyber defense and global supply chains for building software stack the deck against US cybersecurity.
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
Russian interference deeply marked the 2016 American presidential election. Four years later, let's analyze the form and impact of disinformation coming from Russia.
Australia's new voluntary code of practice to make IoT devices more secure may expose consumers to greater risks.
Taiwan has a population of over 20 million people and no new cases of coronavirus since mid-April. Embracing 'digital democracy' and 'hacktivism' have been the keys to their success.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they're not all equally protective.
DIY labs have disrupted industries from alcohol to pharmaceuticals. During the coronavirus pandemic, curious people have more opportunities to innovate from home.
Legislation expected to be put to Parliament later this year may very well fall short due to COVID-19's budget impacts. But until we strengthen our cyber defences, we're all at risk.
A social media researcher explains how bots and sock puppet accounts manipulate and polarize public debate.
Australia is coming under sustained cyber attack by a 'state-based' actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.
Vulnerable websites are popping up as organizations move online during the coronavirus pandemic – and hackers have more time at home alone. The result is more websites falling victim to defacement.
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it's time to change that.
Instead of going after large corporate networks, which often have multiple defenses, cybercriminals can now simply target people's home networks.