Children will skirt around tech barriers if they feel restricted.
Here's a list of terms and security tools that can help you – and your family – feel more confident about cybersecurity.
The latest malware is designed especially to make small companies pay through the nose for their data.
Biometric systems are increasingly used in our civil, commercial and national defence applications.
Current techniques to protect biometric details, such as face recognition or fingerprints, from hacking are effective, but advances in AI are rendering these protections obsolete.
No method is perfect, but physical security keys are a reliable form of multi-factor authentication.
Do you receive a code via SMS message, email or voice call to sign into your bank account? This security method is no longer considered very secure.
Lego Mechanic might look sweet and innocent, but what’s that smile really hiding?
The danger with car hacking isn't terrorists taking control of your car (as movies might have you think), but the age old problem of dodgy mechanics getting you to spend more on servicing it.
We need a cyber safety equivalent to the Slip! Slop! Slap! campaign to nudge behavioural change in the community.
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
Prime Minister Morrison said there was no evidence of electoral interference linked to a hack of the Australian Parliament House computer network.
For many of us, this hack seems to have come out of the blue. But cyber measures targeting Australian government infrastructure are the 'new normal'.
Who’s really on the other side?
Despite the uncertainties – and dangers – of retaliating against suspected cyberattackers, a surprising number of companies and countries are exploring doing just that.
Many people don’t want to let go of how they create passwords.
When it comes to picking a new password, people's resistance to change can make them less secure online.
Secure communications are increasingly important.
Virtual private network companies make lots of promising claims about their services. Most people don't have the skills to double-check their providers. So this group of researchers did the testing.
If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs.
The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures...
Prepare to protect yourself.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
Blockchain technologies can empower people by allowing them more control over their user data.
Blockchain technologies can support users in controlling access to their data through smart contracts that both empower and protect users.
They’re small and well-connected, but how safe are ‘internet of things’ devices?
As the number of 'internet of things' devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
What dangerous experiences lurk behind the use of this trackpad?
Protect yourself from hackers, trolls, bots, social media executives and programmers in need of ethics training.
If Australia’s electricity grid was targeted by cyber attack the fall out could be severe.
Austraia's first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
There is no clear cybersecurity governance framework geared towards detecting and preventing attacks against digital identity assets.
Digital identity assets, such as property records and Parliamentary proceedings, embody who and what Australia is as a nation. We need to do more to protect them.
We found hundreds of local council workers willing to give out login details for government systems without realising.
The public needs help from officials who can protect and serve.
Governments can help citizens protect their own cybersecurity by providing practical advice and meaningful support.