An estimated A$75,000 is lost by Australians everyday to online fraud but police are having some success in alerting people before they even know they’re being scammed.
Is mass data retention the way to go or should authorities be forced to come back with a warrant to find what they want?
Flickr/Rosalyn Davis
As the Australian government pushes on with its data retention bill there are still questions about what safeguards and protections are in place, and a look at similar moves that have failed overseas.
The metadata report disregards a range of reports demonstrating that retention is ineffective.
Flickr/r2hox
The endorsement of Australia’s data retention bill raises questions about why the reforms are being pushed now, when they had been resisted by others for so long.
There are still unanswered questions about the government’s proposed metadata retention bill.
Lars P./Flickr
The Australian government’s meta data retention bill cares more about who you connect with than what services you may use. Yet many such online services may also be out of its reach.
Tor, your online an-onionising software.
Tor Project
The Silk Road trial has concluded, with Ross Ulbricht found guilty of running the anonymous online marketplace for illegal goods. But questions remain over how the FBI found its way through Tor, the software…
Following the trend of giving catchy names to serious operating system security flaws, the Linux vulnerability revealed recently by security researchers Qualys has been called Ghost. Like Heartbleed and…
The financial institutions of the City of London and Wall Street are to take part in a series of “war game” exercises aimed at testing their resilience to cyber attack. The announcement comes as prime…
Hacking and making a profit isn’t as easy as it looks.
Reuters
In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
Is it a crime scene or just a store checkout? Could be both.
Marlith
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
Digitising public services and putting them online to reap the cost and efficiency benefits is something that’s been tried with varying degrees of success. The UK government’s “digital by default” policy…
We should know by now - don’t click that link.
Bill Buchanan
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is…
First rule of advertising: don’t believe the advertising.
Bloomua/Shutterstock
At the recent Information Security Solutions Europe conference, former White House cybersecurity adviser Howard Schmidt claimed that most security threats may be persistent, but are not as “advanced” as…
Call that security? How safe is your own password from hackers.
Flickr/Victor Bayon
In 2004 Bill Gates pronounced usernames and passwords dead. Gates, a man consistently thinking ahead of the crowd, was right. Most of us – including our employers and the online services we rely on – just…