Applies to your Phones, Tablets, PCs and Websites You do not want your device assisting in a major DDOS attack world wide.
If you connect it to the Internet, someone will try to hack it.
If what you put on the Internet has value, someone will invest time and effort to steal it.
Even if what is stolen does not have immediate value to the thief, he can easily find buyers for it.
Australian Law
Australian Government Reference and Reporting websites.
CERT Australia. (national computer emergency response team)
DDOS tracking is very difficult because of IP spoofing and requires a lot of resources just to identify zombie devices let alone the perpetrator. Over 90% of attacks come in from overseas, with jurisdictions outside Australian Authorities.