The U.S. Justice Department was among many federal agencies and private companies whose networks suffered intrusions from Russian hackers.
AP Photo/Jacquelyn Martin
A scholar of cyber conflict sets out why retaliation doesn't prevent future attacks, and explains what might have a better chance.
Federal government agencies, from the Treasury Department to the National Nuclear Security Administration, have been compromised by the attack.
Tasos Katopodis/Getty Images
Cyberwarfare is more like cancer than bombs and bullets. Cybersecurity experts are just beginning to make their diagnosis of the Sunburst hack.
Mick Tsikas/AAP Image
Australia is coming under sustained cyber attack by a 'state-based' actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard.
U.S. Air Force photo by J.M. Eddins Jr.
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it's time to change that.
Shire of Katanning
The wool industry was paralysed for several days after hackers held to ransom the IT system that governs almost all wool sales in Australia and New Zealand. More attacks are a case of if, not when.
In the wake of U.S. killings, Iran’s supreme leader vowed ‘harsh revenge’ – which could come in the form of cyber attacks.
Office of the Iranian Supreme Leader via AP
Less overt than conventional military actions, cyber attacks can have dangerous consequences – especially when they target critical infrastructure systems controlled by the private sector.
Cyber attacks aren’t warfare.
Treating non-violent cyber attacks as warfare could lead to unnecessary escalation.
astudio / Shutterstock.com
Countries may be forced to choose whether they side with the US or China when it comes to Huawei.
The U.S. military is shifting the focus of its cyberwarfare forces.
U.S. Air Force
A new strategy for U.S. Cyber Command seeks to block enemies from achieving their objectives – but may not be successful, and could have unforeseen consequences.
Cyber attacks need two components – the tools to exploit vulnerabilities and the people with the expertise to deploy them.
What constitutes cyberwar?
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
The US has charged and sanctioned nine Iranians and an Iranian company for cyber attacks.
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
Countries affected by prolonged periods of cyber warfare need peacekeeping assistance to recover.
Hackers will start to get help from robots and artificial intelligence soon.
It won't be like an army of robots marching in the streets, but AI hacking is on the horizon.
The Information Warfare Division will require much broader skill sets than typically associated with defence force personnel.
The Australian Defence Force's new Information Warfare Division will require time and political capital to shape a capable workforce.
WikiLeaks claims the CIA has been involved in intensive hacking operations.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
For allies of the United States, the reality of a Donald Trump presidency has just begun to sink in.
How the internet has made us terrifyingly vulnerable.
Is everything on the up-and-up here?
With the DNC email leak and Trump calling on Russia to hack Clinton's emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?