Menu Close

Articles on Cybersecurity

Displaying 641 - 660 of 686 articles

The aftermath of the Bali bombing in 2002 that killed dozens of Australians. Do our intelligence services need further investment to prevent such tragedies from occurring again? AAP/Dean Lewins

Not so smart: the Coalition intelligence review repeats old mistakes

The Coalition has promised it will “rebuild” Australia’s frontline national security agencies if it wins government at the upcoming election. Shadow attorney general spokesman George Brandis has laid out…
There is hope that Xi Jinping could help usher in a new era of cyber-collaboration. PA

Cyber-security a key issue for US-China presidential summit

US President Barack Obama hopes to lay the foundations for a long-term relationship when he meets Xi Jinping, China’s new president, for a two-day summit in Southern California on Friday. Obama has a difficult…
You’ve got a message. Hackers knew that before you. Akshat Rathi

The real phone hacking scandal is in your pocket

There are now more mobile devices than people on our planet. The amount of personal data we share through mobile devices is also increasing. So it is not surprising that cyber-criminals want a piece of…
The blanket term “hack” can encompass a whole range of attacks – but what are they? Anant N S

Explainer: what is hacking?

Last week, we woke to news that the largest cyber attack ever was underway in Europe, with reports of global internet speeds falling as a result of an assault on the anti-spamming company Spamhaus. In…
The RBA has been the subject of hacking attacks – but that is not unusual. AAP/Sergio Dionisio

The RBA state-sponsored hack attack (or phishing for a story)

You’ll have seen the fallout this week regarding a so-called “spearphishing” attack on the Reserve Bank of Australia (RBA) in 2011. As with most media reports on cyber-attacks, this one appears to have…
Basic tenets of internet security are being ignored by some users and website developers. dustball

The ABC’s website has been hacked … but how?

Yesterday the ABC was attacked, supposedly in response to the network giving coverage to an Australian visit by the controversial Dutch politician Geert Wilders. A Twitter user, “Phr0zenMyst”, claimed…
Julia Gillard has presented a coherent plan for an uncertain future. AAP/Lukas Coch

Gillard’s security strategy prepares for the known unknowns

The central problem for defence and security planners right now is uncertainty. The clarity of the Cold War is gone, new threats such as terrorism have come, and seemingly peaked, and what the rise of…
Prime Minister Julia Gillard delivers a speech outlining Australia’s new National Security Strategy. AAP

Cyber Security Centre planned to target growing threat

“The internet must remain open but also secure,” Prime Minister Julia Gillard said today, flagging plans for the development of a new Cyber Security Centre by the end of the year. Ms Gillard said with…
Students at the Matraville Soldiers Settlement Public School are part of a program designed to teach them cyber safety and security. McAfee

PM calls on social media companies to help take on cyber bullies

Prime Minister Julia Gillard has called on Twitter to join other social media companies that have agreed to a protocol to help deal with cyber bullying. The Prime Minister was speaking after the launch…
The Origin Smart portal provides customers with an estimate of future electricity bills. fudj

Is Origin Smart sleepwalking into a shocking personal data breach?

Early last week, Origin Energy, Australia’s pre-eminent energy retailer, launched an online energy-use monitoring portal Origin Smart to much fanfare. All good – but what about the the privacy and security…
Australia’s place in the online world is changing, with significant consequences. lintmachine

Cybercrime bill makes it through – but what does that mean for you?

Yesterday afternoon the Australian Senate passed the Cybercrime Legislation Amendment Bill 2011 following amendments suggested by the Labor Party. It’s been more than a year since the bill was first introduced…
Thinking you know every trick in the book doesn’t mean you really do. Don Hawkins

SCAMwatch – a helping hand against online scammers

Crimes of confidence, known as scams, are on the rise. You probably know the basics. The way the most common type of scam works involves you being presented with an offer, product or service for which…
Information gleaned from data mining is a prized delicacy in certain circles. Philippe Put

Why is Telstra Next G serving your data to Netsweeper in America?

Telstra representatives have this week admitted to collecting data for a new internet filtering product and sending this data to the USA office of Netsweeper Inc. Netsweeper Inc, based near Toronto, Canada…
Could hacking Mark Zuckerberg’s social media giant lead to a fruitful career? Hegemony77 doll clothes

Facebook welcomes hackers, if they wear a white hat

As reported late last week, Facebook is encouraging hackers to try hacking its security systems to find weaknesses. Those who succeed will receive a reward of US$500 or more and have their name added to…
Hackers with a commercial eye seem intent on destroying Apple’s reputation as a “malware-free” PC alternative. Mike Poresky

Think your Mac’s beyond malware attack? Alas, those days are gone

For a long time Mac users would look at all the malware (malicious software) that infects Windows PCs and think how fortunate they were that such attacks did not happen to MAcs. But now, it would seem…

Top contributors

More