Google’s Android now dominates 80% of the smart phone market. Of the major phone operating systems, Android is the most vulnerable to security breaches and yet perceptions haven’t caught up with reality…
There are many tales in literature over millennia about people selling their soul to a malevolent deity for the right price. But at least it’s usually a good price. Recent research has discovered that…
Computer system administrators around the world are groaning again as six new security problems have been found in the OpenSSL security library. OpenSSL is a security tool that provides facilities to other…
It’s little wonder that computer experts are warning that computer users could be experiencing “notification fatigue” after the past few weeks. But even if you’re feeling overwhelmed following the Heartbleed…
Several high-profile security breaches have, of late, got many people wondering about their passwords. It would be great news if I could tell you a perfect sure-fire system to manage your passwords; the…
The latest internet giant to have its security compromised is eBay. A database containing user information has been hacked, leaving potentially millions of people vulnerable. The revelation is clearly…
How do organisations and their Information Technology departments rate when it comes to protecting themselves and their organisations against the ever present cyber risks and cybercrime? The answer is…
In a surprising move, a US District Court has charged five members of the Chinese military with hacking six US companies to obtain commercial secrets over the last eight years. The move has been denounced…
There is nothing worse than having a fake healer offer a cure that does absolutely nothing. History is full of tales of frauds and quacks offering a cure for all, which eventually turn out to be nothing…
The recently released Commission of Audit report recommends that the Australian government needs to become “digital by default”. The continued shift to digital service delivery is intended to reduce costs…
It seems hardly a week goes by without a major cyber security flaw exposed that could be exploited across millions of internet and mobile connected devices. This week it was the Internet Explorer browser’s…
The web is full of scare stories about the Heartbleed security vulnerability but panicking won’t help. Better to use this situation as an opportunity to clean up our acts. Few of us do it but we should…
If you’re struggling to understand the deluge of information about the Heartbleed vulnerability, you’re not alone. Some reports tell us to change all our online passwords immediately, others warn us that…
The CIA and the congressional committees charged with overseeing it are fighting again. With a report on the agency’s post-9/11 interrogation practices still not forthcoming, senate intelligence committee…
Some recent high-profile crimes have got people thinking about how we should handle those who break the law using digital technologies. Criminal sentencing is decided by the type of crime and a range of…
Most people would agree with the principle that good foundations are essential to any structure that is intended to last. But what if when you started building, you didn’t envisage how large, complex or…
Not all violence in war and conflict is simply strategic. And not all the destruction that takes place is a consequence of territorial or geopolitical objectives. Taking over the next village, blocking…
Joyriding – stealing a car just for the fun of it – is a signature act of troublemaking teenagers seeking excitement and a chance to show off their bravado. But while car theft is among the most common…
Businesses battling to keep their information safe pricked up their ears last week as it was announce that Boeing has produced a mobile phone that self-destructs should the wrong person try to use it…
Most office workers send dozens of electronic communications to colleagues in any given working day, through email, instant messaging and intranet systems. So many in fact that you might not notice subtle…