The Australian National University has been working with intelligence agencies to minimise the impact of a cyber attack on its systems.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
With so many reports of data breaches, it is easy to tune out to what is happening.
Data breaches are fact of modern life. It's likely each of us will have our personal information compromised at some point. Here's how to reduce the risk and limit the damage if and when it occurs.
Distributed Denial of Service (DDoS) attacks are up 16% in the last year.
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
A new act is trying to lock down cyber crime in Kenya.
Kenya’s new Computer and Cyber Crime Act must not be abused by the criminal justice system.
Targeted advertising: good for Facebook and Google, not so good for you.
Google and Facebook reign supreme over digital advertising. Yet the Cambridge Analytica scandal, and when the effectiveness of this advertising seems limited, should we ban this model?
Probes that can transmit electricity inside the skull raise questions about personal autonomy and responsibility.
Where does responsibility lie if a person acts under the influence of their brain implant? As neurotechnologies advance, a neuroethicist and a legal expert write that now's the time to hash it out.
It seems near impossible to keep control of our personal data – and Facebook does anything but help.
Do you think you’ve set up your Facebook account so that only your friends can see your information? Think again…
How secure is your password?
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
Servers hosting your favorite websites may be subject to denial-of-service attacks.
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Money is a crucial target for North Korea’s hacking efforts.
North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Hacks like the one on Coincheck expose gullible investors to risk, but it also means funds could be flowing undetected into the hands of money launderers and terrorists.
Australian regulators face similar problems as their Australian counterparts in getting cryptocurrency platforms to regulate and prosecuting them when things go wrong.
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Wasting time on the internet at work could be putting your company's cyber-security at risk.
Who should be allowed inside?
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
U.S. President Donald Trump has taught the world many lessons since his time in office – mostly on how not to govern.
(AP Photo/Carolyn Kaster)
Love him or hate him, Donald Trump has shown us a great deal in his short time on the political stage. For that, we should be grateful. Here are the lessons taught by Prof. Trump.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
South African Deputy President Cyril Ramaphosa claims the country’s security agencies hacked his emails.
It would be no surprise if Deputy President Cyril Ramaphosa's claims of the state spying on him turn out to be true. After all, state spy agencies have been abused before in ANC factional battles.