The padlock icon which appears in most internet browser address bars.
The padlock symbol simply means that the data being sent between the web server and the user’s computer is encrypted and cannot be read by others. But many people don’t know that.
Australia could become one of the world’s strongest cyber nations – but the success of the new strategy will come down to the details.
The policy, to be released on Wednesday by O'Neil, who is Minister for Home Affairs and Minister for Cyber Security, is also designed to enable victims to bounce back faster from attacks that can’t be prevented
Boris Zhitkov/Getty Images
Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
A cyberattack on one of Australia’s biggest port operators has highlighted the potential vulnerability of the global economy.
Port operator DP World handles roughly 40% of Australia’s sea freight. Over the weekend its ports were disrupted by what appears to be a malicious, targeted cyberattack.
Remote workers lack the same institutional cyber protection as their in-office colleagues.
A survey of remote and office workers found that people working from home were more likely to take steps to protect themselves against cybersecurity threats.
The draft bill has a number of issues, ranging from an insecure mechanism that leaves people’s data vulnerable to attacks, to a lack of mandatory disclosure of data breaches.
A new type of spyware means those online ads could go from annoying to menacing.
AP Photo/Julio Cortez
You probably won’t be targeted by spyware, but if you are, odds are you won’t know about it. The latest spyware slips in unseen through online ads as you go about your digital life.
The Security Intelligence Service needs public support and trust to do its work well. Adding a degree of transparency to it’s annual threat assessment should help.
There are different tactics that governments can use to block the internet, some more sophisticated than others.
African countries are lagging behind in digital advancements.
The borderless nature of cyberspace presents particular challenges for African states used to controlling activities in their territory.
Scammers have exploited a simple weakness in the myGov online portal to redirect hundreds of millions of dollars in tax refunds.
One-third of customers will return to a hacked site without even changing their password, according to a recent study.
d3sign/Moment Collection/Getty Images
Companies tend to focus on appeasing angry customers after a data breach. New research shows they may want to pay more attention to customers who are afraid to return to their site.
Kurt Eichenwald, left, The Conversation’s investigative editor, and Georgia State professor David Maimon working.
Why The Conversation U.S. started an investigative unit.
Peter Dutton walks past a screen outlining cyber attacks around the world while visiting the Australian Signals Intelligence Directorate in March last year.
Much of the history of signals intelligence in Australia – revealing secrets and protecting one’s own – is tacit and poorly understood. A new book lifts the lid on this world.
The new techniques go far beyond hacking your car’s key fob system.
The Five Eyes alliance is critical to hunting and detecting foreign cyber actors, but tends to work in secret.
Over the years Australia has been quick to point the finger at China – most recently in relation to DJI drones. Instead, we should look closely at our own tech security policies.
This orbiting museum in the show ‘Star Trek: Picard’ plays a key role in fending off a futuristic form of cyberattack.
‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.