Giving away the keys to cybercriminals.
Intel Free Press/flickr
Intel has used the 5th anniversary of their purchase of security company McAfee to release a review of how the cybersecurity landscape has changed in that time. There are a number of surprising observations…
Not enough legislation.
Most African countries lack legislation to protect people from online crime and abuse.
There’s a dark side to the internet.
There's a dark side of the internet, where almost anything goes, or can be bought for the right price.
No one is immune from cyber crime… no matter how protected you think you are.
If you think you're not at risk from cyber crime then think again. Everyone connected to the internet is a potential target and hackers are gathering what they can to try to gain your trust.
Tell no one… that we’ve just lost all your data.
When hackers take down companies in response to their actions, security chiefs need to know what the CEO is saying in public.
Despite its longevity, now there’s more than just aesthetic reasons to drop Flash.
logo by 360b/Shutterstock.com
As big browsers and sites like YouTube drop support, are our Flash days numbered?
The many identities of Ross William Ulbricht.
Federal Bureau of Investigation
Ross William Ulbricht, the tech-savvy Texan who created the Silk Road, was sentenced to life in prison without parole on charges that equated him with a mafia boss.
There aren’t enough skilled investigators to tackle the cybersecurity problem.
The resources of those in cybercrime outstrip the agencies investigating them - we need more skilled digital forensic specialists fast.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Claims that a cybersecurity expert hacked an aeroplane's cockpit might not be as unbelievable as they first seem.
When malware stops looking like malware, we’re in for a tough ride.
patterns by cepera/shutterstock.com
Recognising malware patterns is key to the effectiveness of antivirus programs.
The challenge is to keep the cyber criminals locked out of systems.
With cybercrime estimated to cost the global economy upwards of US$400 billion a year -- and expected to rise -- what are the challenges to beating the criminals?
Binary systems are not enough if you want to improve security.
As hackers get more sophisticated in their cyber crime efforts we need to look to new technology to make our systems more secure, and potentially unhackable. So how can quantum physics help?
Forensics is a very different business when it comes to technology.
Forensics is changing in the digital age, and the legal system is still catching up in terms of how it uses digital evidence.
The supply side of information security professionals is not keeping up with the demand.
Image sourced from Shutterstock.com
As the US and UK look to the opportunities presented by cybersecurity, Australia is still dealing with a critical skills shortage.
If you’ve been hacked or had your identity stolen, time is of the essence when it comes to minimising the damage.
Image sourced from Shutterstock.com
Preventing and responding to the hacking epidemic is not a problem for one group or organisation to solve. And what happens in the first 72 hours can make all the difference.
Frustrated by a lack of investment in cybersecurity?
The thefts make big headlines but rarely hit the bottom line, creating a moral hazard risk that companies won't invest enough to beef up their security.
Facepalm… that sinking feeling of inaction.
The European Commission’s annual Eurobarometer Cyber Security Survey, the third edition of which was recently released, is a substantial survey of more than 27,000 respondents from 28 countries. It contains…
We all need to clean up our online acts.
Intel Free Press
No matter how strong an organization's cybersecurity, our own bad behavior could make us the "unintentional insiders" for the next big hack.