Cyberattacks on Australian healthcare facilities are on the rise.
Beyond the obvious risk of financial loss, cyberattacks can weaken our trust in digital infrastructure – and by extension, our trust in public institutions, too.
Legislation expected to be put to Parliament later this year may very well fall short due to COVID-19's budget impacts. But until we strengthen our cyber defences, we're all at risk.
'Zoombombing' trolls have started to infiltrate virtual meetings - bombarding unsuspecting victims with racist and sexist speech and in some cases, pornographic imagery.
The Iranian military operates cyber espionage and sabotage through a network of dozens of contractors, allowing the state to attack foes while denying involvement.
Less overt than conventional military actions, cyber attacks can have dangerous consequences – especially when they target critical infrastructure systems controlled by the private sector.
A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
Research shows we're pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Treating non-violent cyber attacks as warfare could lead to unnecessary escalation.
Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There's less attention to the dangers of cyberattacks, which could cripple key utilities.
The worst-case scenario is that hackers still have access to the university systems via a backdoor and are siphoning off critical data as it emerges.
Cyber attacks are becoming part of traditional warfare, but who should be targeted in response and what force should be used?
The very first cyberattack clogged up the nascent internet, halting digital communications. Now much bigger, the internet is still largely open to – and suffering regularly from – similar attacks.
As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
Researchers used a fax machine that wasn't even connected to the internet to break into a computer network.
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
All the cyber threats that fans and footballers face at the World Cup...and tips for remaining safe.
World Water Day shines a light on the importance of safe, clean drinking water, but a new report finds Canada's freshwater systems are under stress.