Prepare to protect yourself.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
Blockchain technologies can empower people by allowing them more control over their user data.
Blockchain technologies can support users in controlling access to their data through smart contracts that both empower and protect users.
They’re small and well-connected, but how safe are ‘internet of things’ devices?
As the number of 'internet of things' devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
What dangerous experiences lurk behind the use of this trackpad?
Protect yourself from hackers, trolls, bots, social media executives and programmers in need of ethics training.
If Australia’s electricity grid was targeted by cyber attack the fall out could be severe.
Austraia's first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
There is no clear cybersecurity governance framework geared towards detecting and preventing attacks against digital identity assets.
Digital identity assets, such as property records and Parliamentary proceedings, embody who and what Australia is as a nation. We need to do more to protect them.
We found hundreds of local council workers willing to give out login details for government systems without realising.
The public needs help from officials who can protect and serve.
Governments can help citizens protect their own cybersecurity by providing practical advice and meaningful support.
Cybersecurity professionals work in software development, network testing, incident response and policy development.
Cybersecurity professionals are often portrayed as lone hackers in hoodies. But as well as technical skills, they also need to be excellent communicators and have a high degree of personal integrity.
Emmanuel Macron called for support for “open, secure, stable, accessible and peaceful cyberspace”.
The French president's Paris Call is for international collaboration to make the Internet safer. What are the advances and limitations of this text?
A 3D rendering of a command centre interior.
Nuclear command and control - the computer systems, networks and procedures - is at risk from cybersecurity threats.
As Americans go to the polls, the voting process and the information environment are still not secure.
AP Photo/David Goldman
Protecting democracy requires more than just technical solutions. It includes education, critical thinking and members of society working together to agree on problems and find solutions.
The online voting glitches in Ontario’s recent municipal elections show it’s time to develop nationwide guidelines and standards for online voting in Canada.
Online voting glitches in Ontario's recent municipal elections show that Canada needs to develop voluntary standards on online voting.
Floods of traffic can clog up an internet server and the wires connecting it to other systems.
The very first cyberattack clogged up the nascent internet, halting digital communications. Now much bigger, the internet is still largely open to – and suffering regularly from – similar attacks.
A test subject entering a brain password.
Wenyao Xu, et al.
Biometrics are more secure than passwords – but when they're compromised fingerprints and retina scans are hard to reset. Brain responses to specific stimuli are as secure and, crucially, resettable.
Apple has removed several security tools from the Mac app store after they were found to be collecting unnecessary personal data.
Before you download antivirus and ad-blocker apps, do your due diligence on what personal information they want to access. Here are some tips on what to look out for.
An e-ballot is less secure than one on paper.
The stability and integrity of democratic society are too important to be relegated to inherently flawed computer systems that are vulnerable to malfunctions and malicious attacks.
What if you could make a microchip at home?
Cybersecurity efforts could take a lead from open-source software, creating hardware whose designs are open for all to see and examine.
Could this plug bring both power and peril?
Cybercriminals may steal data from laptops and mobile phones when they are plugged in via USB ports.