Cyber attacks are becoming part of traditional warfare, but who should be targeted in response and what force should be used?
astudio / Shutterstock.com
Countries may be forced to choose whether they side with the US or China when it comes to Huawei.
The U.S. military is shifting the focus of its cyberwarfare forces.
U.S. Air Force
A new strategy for U.S. Cyber Command seeks to block enemies from achieving their objectives – but may not be successful, and could have unforeseen consequences.
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation 38.8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
While the government has not identified the state actor, China is.
Bill Shorten said party political structures were perhaps more vulnerable than government institutions - and progressive parties particularly so.
Cyber attacks need two components – the tools to exploit vulnerabilities and the people with the expertise to deploy them.
Who’s really on the other side?
Despite the uncertainties – and dangers – of retaliating against suspected cyberattackers, a surprising number of companies and countries are exploring doing just that.
Novichok poisoning: cleaning up after a nerve agent was used on the streets of Salisbury.
Andrew Matthews/PA Archive
The UK has become surprisingly willing to brief the press about possible use of cyber attacks, including against Russia in response to the Skripal attack.
Outside forces pushed the American people farther apart.
Cybersecurity experts in the US knew about Russian intelligence agencies' activities, but may not have had any idea how comprehensive and integrated they were – until now.
What constitutes cyberwar?
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
Information warfare in cyberspace could replace reason and reality with rage and fantasy.
Simulation models show just how effectively fake news and propaganda can shift opinions.
Money is a crucial target for North Korea’s hacking efforts.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
The government’s Defence Export Strategy aims to make Australia a world leader in arms exports.
The government wants Australia to grow defence exports 800% by 2028. Investing in the cyber industry may be the only way to get there.
Countries affected by prolonged periods of cyber warfare need peacekeeping assistance to recover.
With artificial intelligence weapons on both sides, are we in a new cold war?
As tensions between the US and Russia escalate, both sides are developing technological capabilities, including artificial intelligence that could be used in conflict.
The Iranian Cyber Army has taken over many websites.
Iranian cyberthreats come from independent hacker groups and from those suspected of having government ties. Their efforts may be part of a campaign to counterbalance other international powers.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
North Korean cyberattacks may increase as the country comes under greater international pressure.
BeeBright via shutterstock.com
The international community – and the U.S. and China in particular – should give serious thought to what might be North Korea's cyberattack equivalent of a nuclear weapons test.
Can we reduce the likelihood of digital attacks?
Digital defense via shutterstock.com
For decades, deterrence has effectively countered the threat of nuclear weapons. Can we achieve similar results against cyber weapons?
The internet's architecture is under attack again as a huge denial of service attack takes out major sites in US and Europe.