How the internet has made us terrifyingly vulnerable.
It’s a cat and mouse game that could put our online privacy and security at risk.
As governments look to new ways to step up surveillance, hackers find new ways to subvert it. Is there a way to end this cat and mouse game, described as a crypto-war?
Online fraud is now the most common type of crime, so what should the police and tech firms do to put a stop to these often invisible attacks.
Cyber attacks represent a significant threat to Australia’s civil infrastructure.
The US and the UK realise the urgent need for serious investment in cybersecurity. So why is the Australian government taking the issue so lightly?
Inside the U.S. Army’s Cyber Operations Center at Fort Gordon, Georgia.
The country's actual offensive cyber capabilities remain shrouded in the classified world. But what is public is enough to discuss potential cyber weapons and how they might be used.
Temelin nuclear power plant, Czech Republic.
Recent terrorist attacks have heightened concerns about the security of nuclear plants. A former top U.S. nuclear regulator says security is weak at many sites worldwide.
Cyber weapons are allowing states to attack each other without fear of retaliation. The consequences potentially are devastating.
Federal computer systems are under near-constant attack from hackers and cyberthieves. Is our information protected well enough?
Federal networks need stronger cybersecurity measures than most organizations, but have not yet gotten the budget or staffing commitments that would protect them properly.
Could the hack that took out the power grid in Ukraine happen in the U.S.?
Malware has brought down the power grid in the Ukraine. What were attackers after and could it happen elsewhere?
Steag/VGB Power Tech GmbH
The cyberattack that brought down a city's power supply in Ukraine is a cautionary tale for what lies ahead.
The fingerprints might indicate China, but that’s not so easy to prove.
This week's hack of the Bureau of Meteorology appeared to come from China, but how do we know? The problem is, it's notoriously difficult to pinpoint the origin of a hack.
Anonymous can do more harm than good in its war on Islamic State.
The Anonymous hacktivist group engaged in an online war against Islamic State may be doing more harm than good.
There are a few things you can do to keep yourself safe online.
Getting the basics of cybersecurity right could eliminate 85% of the threats overnight. Here are some tips to get you started.
When Facebook goes down it's an irritation. But as the world moves its data and processing to the cloud, the potential for major loss grows ever greater.
More jaw jaw, less war war.
Sanctions against Russia and China would only escalate cyber-attacks, when what's needed is international agreement.
How secure are your passwords?
No matter how many times people are warned to set strong secure passwords, many don't. So why do people take the risk? And is there anything else they can do to be more secure online?
Official U.S. Air Force/Flickr
A new report on the future of humanity explains what we really need to be worrying about over the next 35 years.
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
No one is immune from cyber crime… no matter how protected you think you are.
If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.