Cyber attacks have created new dilemmas for philosophers who determine the ethics of war.
The Australian government's new cyber security plan moves in the right direction, but success will depend on how it's executed.
Beyond the obvious risk of financial loss, cyberattacks can weaken our trust in digital infrastructure – and by extension, our trust in public institutions, too.
Legislation expected to be put to Parliament later this year may very well fall short due to COVID-19's budget impacts. But until we strengthen our cyber defences, we're all at risk.
The Iranian military operates cyber espionage and sabotage through a network of dozens of contractors, allowing the state to attack foes while denying involvement.
After the assassination of General Qassem Soleimani, further esclation in the conflict between Iran and the US could come in the form of a cyber-attack.
NATO had its 70th birthday party in London at an awkward moment.
The US defense community is coming to understand that AI will significantly transform, if not completely reinvent, the world's military power balance.
Treating non-violent cyber attacks as warfare could lead to unnecessary escalation.
China and the United States are not at war, but cyberspace has created opportunities for intelligence gathering, influence and sabotage that are already taking place.
Dozens of countries and hundreds of firms and nonprofits are fed up with digital violence and are working toward greater cybersecurity for all.
Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There's less attention to the dangers of cyberattacks, which could cripple key utilities.
A defender that can hold out while inflicting greater losses on its attacker can wear down an adversary – reducing the threat of additional attacks.
US and Russian tension over power grid cyber attacks is a concern for global stability, but it also highlights our own critical infrastructure vulnerabilities.
Cyber attacks are becoming part of traditional warfare, but who should be targeted in response and what force should be used?
Countries may be forced to choose whether they side with the US or China when it comes to Huawei.
A new strategy for U.S. Cyber Command seeks to block enemies from achieving their objectives – but may not be successful, and could have unforeseen consequences.
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation38.8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Bill Shorten said party political structures were perhaps more vulnerable than government institutions - and progressive parties particularly so.
Cyber attacks need two components – the tools to exploit vulnerabilities and the people with the expertise to deploy them.