US and Russian tension over power grid cyber attacks is a concern for global stability, but it also highlights our own critical infrastructure vulnerabilities.
Two security scares in the past 24 hours should prompt you to make sure your software is up-to-date. But what are the risks?
Scott Morrison has bragged about 'stopping the boats', but his government has failed to do anything meaningful to bolster cyber security and stop the malware.
If another country wants to weaponise data hacked through Australia's parliament, we'll likely see them try to inflame religious and ethnic differences, and drive votes to minor parties.
Cyber attacks are a real and increasing threat to Australia, and the law lags a long way behind in both protection and recourse.
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here's what could happen if you do – and how you can minimise your risk.
German MPs were outraged they weren't notified they were targets in a cyber attack, which resulted in the public release of mobile phone numbers and credit card information.
Austraia's first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
Digital identity assets, such as property records and Parliamentary proceedings, embody who and what Australia is as a nation. We need to do more to protect them.
We found hundreds of local council workers willing to give out login details for government systems without realising.
Cybersecurity professionals are often portrayed as lone hackers in hoodies. But as well as technical skills, they also need to be excellent communicators and have a high degree of personal integrity.
Circuit board by Alexandre Debiève
We've no way of knowing if allegations that China implanted secret spying microchips in widely used computers are true.
Gordon Brown is worried. So should we all be.
The UK has become surprisingly willing to brief the press about possible use of cyber attacks, including against Russia in response to the Skripal attack.
BA's handling of the latest corporate cyber attack shows a catalogue of missed opportunities.
Researchers used a fax machine that wasn't even connected to the internet to break into a computer network.
A serious security threat was found in popular video game Fortnite's installation method after it bypassed Google's official app store.
In reality, cybersecurity attacks are like a disease affecting people globally.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.