German MPs were outraged they weren’t notified they were targets in a cyber attack, which resulted in the public release of mobile phone numbers and credit card information.
Austraia’s first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
Digital identity assets, such as property records and Parliamentary proceedings, embody who and what Australia is as a nation. We need to do more to protect them.
Cybersecurity professionals are often portrayed as lone hackers in hoodies. But as well as technical skills, they also need to be excellent communicators and have a high degree of personal integrity.
The very first cyberattack clogged up the nascent internet, halting digital communications. Now much bigger, the internet is still largely open to – and suffering regularly from – similar attacks.
Nir Kshetri, University of North Carolina – Greensboro
As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
The UK has become surprisingly willing to brief the press about possible use of cyber attacks, including against Russia in response to the Skripal attack.
The difference between probing and mapping and actually attacking depends on the intent of the people doing it, which is hard to figure out and may change. The dangers, however, remain worrying.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here’s how you can protect yourself.