Federal government agencies, from the Treasury Department to the National Nuclear Security Administration, have been compromised by the attack.
Tasos Katopodis/Getty Images
Australia is coming under sustained cyber attack by a 'state-based' actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard.
U.S. Air Force photo by J.M. Eddins Jr.
Benjamin Jensen, American University School of International Service and Chris Inglis, United States Naval Academy
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it's time to change that.
The wool industry was paralysed for several days after hackers held to ransom the IT system that governs almost all wool sales in Australia and New Zealand. More attacks are a case of if, not when.
In the wake of U.S. killings, Iran’s supreme leader vowed ‘harsh revenge’ – which could come in the form of cyber attacks.
Office of the Iranian Supreme Leader via AP
Less overt than conventional military actions, cyber attacks can have dangerous consequences – especially when they target critical infrastructure systems controlled by the private sector.
A new strategy for U.S. Cyber Command seeks to block enemies from achieving their objectives – but may not be successful, and could have unforeseen consequences.
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
The US has charged and sanctioned nine Iranians and an Iranian company for cyber attacks.
Parmida Rahimi/Flickr
The international community should set bright line rules on appropriate responses to cyber attacks before an expansive reading of the “self-defense” clause triggers war.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most.
Shutterstock
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
Richard Forno, University of Maryland, Baltimore County
With the DNC email leak and Trump calling on Russia to hack Clinton's emails, concern about foreign meddling in the 2016 presidential election process is rising. Is e-voting the next cyber battleground?
Cyber attacks represent a significant threat to Australia’s civil infrastructure.
Shutterstock
Professor of Strategic Studies, Marine Corps University; Scholar-in-Residence, American University, American University School of International Service