Who’s really on the other side?
Despite the uncertainties – and dangers – of retaliating against suspected cyberattackers, a surprising number of companies and countries are exploring doing just that.
Many people don’t want to let go of how they create passwords.
When it comes to picking a new password, people's resistance to change can make them less secure online.
Secure communications are increasingly important.
Virtual private network companies make lots of promising claims about their services. Most people don't have the skills to double-check their providers. So this group of researchers did the testing.
If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs.
The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures...
Prepare to protect yourself.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
Blockchain technologies can empower people by allowing them more control over their user data.
Blockchain technologies can support users in controlling access to their data through smart contracts that both empower and protect users.
They’re small and well-connected, but how safe are ‘internet of things’ devices?
As the number of 'internet of things' devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
What dangerous experiences lurk behind the use of this trackpad?
Protect yourself from hackers, trolls, bots, social media executives and programmers in need of ethics training.
If Australia’s electricity grid was targeted by cyber attack the fall out could be severe.
Austraia's first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
There is no clear cybersecurity governance framework geared towards detecting and preventing attacks against digital identity assets.
Digital identity assets, such as property records and Parliamentary proceedings, embody who and what Australia is as a nation. We need to do more to protect them.
We found hundreds of local council workers willing to give out login details for government systems without realising.
The public needs help from officials who can protect and serve.
Governments can help citizens protect their own cybersecurity by providing practical advice and meaningful support.
Cybersecurity professionals work in software development, network testing, incident response and policy development.
Cybersecurity professionals are often portrayed as lone hackers in hoodies. But as well as technical skills, they also need to be excellent communicators and have a high degree of personal integrity.
Emmanuel Macron called for support for “open, secure, stable, accessible and peaceful cyberspace”.
The French president's Paris Call is for international collaboration to make the Internet safer. What are the advances and limitations of this text?
A 3D rendering of a command centre interior.
Nuclear command and control - the computer systems, networks and procedures - is at risk from cybersecurity threats.
As Americans go to the polls, the voting process and the information environment are still not secure.
AP Photo/David Goldman
Protecting democracy requires more than just technical solutions. It includes education, critical thinking and members of society working together to agree on problems and find solutions.
The online voting glitches in Ontario’s recent municipal elections show it’s time to develop nationwide guidelines and standards for online voting in Canada.
Online voting glitches in Ontario's recent municipal elections show that Canada needs to develop voluntary standards on online voting.
Floods of traffic can clog up an internet server and the wires connecting it to other systems.
The very first cyberattack clogged up the nascent internet, halting digital communications. Now much bigger, the internet is still largely open to – and suffering regularly from – similar attacks.
A test subject entering a brain password.
Wenyao Xu, et al.
Biometrics are more secure than passwords – but when they're compromised fingerprints and retina scans are hard to reset. Brain responses to specific stimuli are as secure and, crucially, resettable.