The solider of Tallinin, a bronze statue that triggered the first recognised cyber attack.
A decade after the first coordinated cyber attack, the players might be the same, but cyber operations have changed dramatically.
How’s this setting?
When it comes to smart vibrators, be sure to use data protection.
How much data do you still store only on your mobile, tablet or laptop?
We have never been so connected and we are producing more data than ever before. But how can we manage our data effectively while making sure it remains safe?
A way in for government would also allow hackers access.
Using sound waves to disrupt sensor functions is just one of a growing number of "side-channel attacks" that could affect our devices.
Phishing for information and money.
You know it's a serious problem when even Google and Paypal have been targeted.
Changes to the way some organisations must reveal a data breach on personal information.
New legislation will soon require organisations to disclose any data breaches involving your private details. But the legislation still has some gaps in it.
The latest WikiLeaks revelation shows how far the CIA can take its cyber attacks.
WikiLeaks claims the CIA has been involved in intensive hacking operations.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
How secure are you?
As gig work transitions online, knowing how to protect yourself and your devices has never been more important.
The newly created Critical Infrastructure Centre could assist overseas investors on whether they should bid for critical assets like ports.
The new Critical Infrastructure Centre might provide clarity on certain projects but it doesn't resolve the ongoing debate on what approach the government should take with foreign investment.
Smartphones and other devices are popular in indigenous communities throughout Australia.
Cyber safety can mean a different thing for those living in remote Indigenous communities, and it needs to be managed carefully.
There will soon be billions of connected smart devices, and they could be turned against us.
A recent massive distributed denial-of-service attack by compromised Internet of Things devices highlights a growing cyber security threat.
At the UN next week Malcolm Turnbull will be among many leaders responding to the large movements of refugees and migrants across the world.
Apple didn’t know about the vulnerability until the iPhone hack.
Rich rewards are on offer to people who can help private companies develop software to exploit vulnerabilities in technology such as smartphones. It might be legal but is it ethical?
The new Equinix SY4 data centre in Alexandria sure doesn’t look like a cloud from the outside.
Without data centres the world stops. We explored the inner Sydney suburb of Alexandria to learn more about these critical infrastructures.
The Spy Files, released by WikiLeaks, revealed the scale of surveillance going on around the world.
The Australian Broadcasting Corporation’s Four Corners’ Cyber War program, aired tonight, highlighted the personal, commercial and national threats posed by hackers and a general preparedness on all things…
China may be undertaking more cyber attacks than the Australian government has admitted.
It's no surprise that China represents a cyber threat to Australia. But the government has been reluctant to state this fact and needs to respond more decisively.
A new type of computer means we'll need a new way to make our data secure.
By hand: voters use paper and pencil to cast their ballots in the 2016 Australian federal election.
There's something about seeing the ballot process take place – the vote, the count – that inspires confidence. That wouldn't be the same with any electronic voting system.