The weak spots are at the ends.
ThamKC/Shutterstock.com
Governments’ efforts to weaken communications security undermine and distract from the need to protect the real weak points in our online communications.
Taking a much closer look at what’s going on inside malware.
MuchMania/Shutterstock.com
How do malware analysts examine software that’s designed to wreak havoc with computers? By using tools that watch software’s inner workings very closely.
Students infiltrate a host computer under the watchful eye of a mentor during a capture the flag exercise.
Richard Matthews
Cyber Security Summer School is a chance for researchers to test their skills during live penetration testing.
Australian government agencies are employing the services of spyware company Cellebrite.
REUTERS/Issei Kato
The Australian government is using spyware. Is that legal?
Lukas Coch/AAP
Politics Podcast: Peter Jennings on the home affairs department
Peter Jennings says while the Department of Home Affairs will present an array of bureaucratic challenges, it is largely a 'sensible step'.
Why did I click “download”?
Shutterstock
Confidential data and even human lives are at risk thanks to the huge spread of connected technology in healthcare.
The ability of authorities to access encrypted messages must be balanced with the security risks.
Ink Drop/Shutterstock
The Australian government’s proposed law that would force technology companies to decrypt messages could make Australians more vulnerable.
AAP/Andrew Taylor
Politics podcast: Graeme Samuel on data governance
Data Governance Australia chairman Graeme Samuel hopes that a self-regulatory code of conduct will raise the standards among data-driven organisations.
Online frauds on credit cards are on the rise especially during holidays.
Mighty Travels/Flickr
Cyber financial crime is on the rise globally. Here’s how you can stay safe.
How did a journalist manage to buy their own Medicare details on the dark web?
AAP Image/Dave Hunt
The sheer number of fallible people and systems with access to Medicare numbers makes it difficult to keep this data secure.
NotPetya is something a little different.
EPA/ROB ENGELAAR
Mayhem, not money, seems to be the ultimate aim of the latest attack unleashed on computer networks around the world.
Companies need to make sure their own doors are locked.
rodimov/shutterstock.com
When companies neglect cybersecurity, customers – and society as a whole – suffer. It’s time customers demanded better of corporations.
The government wants additional powers to access encrypted messages.
Luis/Flickr
The Australian government wants to access encrypted messages, but don’t call it a “backdoor”.
Both the government and the opposition will warn about terrorists exploiting cyberspace.
Mick Tsikas/AAP
In a security update on the threats facing Australia at home and abroad, Malcolm Turnbull will say that an ‘online civil society is as achievable as an offline one’.
Australia’s cybersecurity strategy needs some work.
Bob Mical/Flickr
The Australian government’s cybersecurity report card is out and the results are worrying.
Demonstration of unmanned aerial vehicles, or drones, at a naval base in California.
REUTERS/Patrick T. Fallon
For-profit corporations are deeply embedded in US national security infrastructure – and they’re not going anywhere.
Cybersecurity jargon can be intimidating, but it needn’t be.
www.shutterstock.com
To protect ourselves online, we should all understand a few key terms.
Businesses struck by ransomware have to make some hard decisions.
Christiaan Colen/Flickr
Movies tell us that paying a ransom means the bad guys win, but in the real world it’s not that simple.
Where are all the data going?
nmedia via shutterstock.com
When smartphone apps get permission to access your location or other activity, they often share that data with other companies that can compile digital profiles on users.
It’s software: There’s always a way in.
BeeBright via shutterstock.com
It can be useful to think of hackers as burglars and malicious software as their burglary tools. Both types of miscreants want to find ways into secure places and have many options for entry.