Lego Mechanic might look sweet and innocent, but what’s that smile really hiding?
The danger with car hacking isn't terrorists taking control of your car (as movies might have you think), but the age old problem of dodgy mechanics getting you to spend more on servicing it.
We need a cyber safety equivalent to the Slip! Slop! Slap! campaign to nudge behavioural change in the community.
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
Prime Minister Morrison said there was no evidence of electoral interference linked to a hack of the Australian Parliament House computer network.
For many of us, this hack seems to have come out of the blue. But cyber measures targeting Australian government infrastructure are the 'new normal'.
Who’s really on the other side?
Despite the uncertainties – and dangers – of retaliating against suspected cyberattackers, a surprising number of companies and countries are exploring doing just that.
Many people don’t want to let go of how they create passwords.
When it comes to picking a new password, people's resistance to change can make them less secure online.
Secure communications are increasingly important.
Virtual private network companies make lots of promising claims about their services. Most people don't have the skills to double-check their providers. So this group of researchers did the testing.
If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs.
The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures...
Prepare to protect yourself.
Think defensively about your online accounts and data security – and don't assume you'll avoid harm.
Blockchain technologies can empower people by allowing them more control over their user data.
Blockchain technologies can support users in controlling access to their data through smart contracts that both empower and protect users.
They’re small and well-connected, but how safe are ‘internet of things’ devices?
As the number of 'internet of things' devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
What dangerous experiences lurk behind the use of this trackpad?
Protect yourself from hackers, trolls, bots, social media executives and programmers in need of ethics training.
If Australia’s electricity grid was targeted by cyber attack the fall out could be severe.
Austraia's first Cyber Incident Management Arrangements are a good start, but the government needs to better engage with private companies to prevent and manage cyber attacks.
There is no clear cybersecurity governance framework geared towards detecting and preventing attacks against digital identity assets.
Digital identity assets, such as property records and Parliamentary proceedings, embody who and what Australia is as a nation. We need to do more to protect them.
We found hundreds of local council workers willing to give out login details for government systems without realising.
The public needs help from officials who can protect and serve.
Governments can help citizens protect their own cybersecurity by providing practical advice and meaningful support.
Cybersecurity professionals work in software development, network testing, incident response and policy development.
Cybersecurity professionals are often portrayed as lone hackers in hoodies. But as well as technical skills, they also need to be excellent communicators and have a high degree of personal integrity.
Emmanuel Macron called for support for “open, secure, stable, accessible and peaceful cyberspace”.
The French president's Paris Call is for international collaboration to make the Internet safer. What are the advances and limitations of this text?
A 3D rendering of a command centre interior.
Nuclear command and control - the computer systems, networks and procedures - is at risk from cybersecurity threats.
As Americans go to the polls, the voting process and the information environment are still not secure.
AP Photo/David Goldman
Protecting democracy requires more than just technical solutions. It includes education, critical thinking and members of society working together to agree on problems and find solutions.