Improved cybersecurity for governments and the private sector is expected to feature in US President Barack Obama’s annual State of the Union Address delivered on Tuesday night (US time) to Congress. The…
Hacking and making a profit isn’t as easy as it looks.
Reuters
In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
That poster’s all you’re gonna get.
Justin Lane/EPA
Is The Interview a good movie? We may never know. After the theft by North Korean hackers of vast quantities of confidential emails, pay information and unreleased film scripts, the drip-drip leaking of…
The consent policies of popular websites would take a month to read. Perhaps including a sign like this would be a simpler solution.
Shutterstock
We live in a world increasingly dominated by our personal data. Some of those data we choose to reveal, for example, through social media, email and the billions – yes, billions – of messages, photos and…
Did they get any Jennifer Lawrence pics?
EPA/Rodong Sinmun
The recent cyber attack on Sony Pictures was so extensive there were notices placed on the entrance doors telling staff not to log in to the company’s network when they reached their desks. Sony’s entire…
Is it a crime scene or just a store checkout? Could be both.
Marlith
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
When all your appliances are internet-enabled, whose hands are holding the remote control?
Hands image via www.shutterstock.com.
An ever-increasing number of our consumer electronics is internet-connected. We’re living at the dawn of the age of the Internet of Things. Appliances ranging from light switches and door locks, to cars…
If cyber-crime is the tier one (most serious) threat that we are told it is, and we are experiencing upwards of 2-3 million cyber-threats each year, then why have we only had 350 or so prosecutions under…
The G20 might seem like a tasty target for hackers, but any real threats will come from elsewhere.
Imaginary Museum Projects: News Tableaus/Flickr
You might have seen reports that the Australian Signals Directorate (ASD) has issued cyber security advice ahead of the G20 Leaders Summit in Brisbane this weekend. So under the watchful eye of the media…
With a few lines of code, cyber criminals and governments have able to infiltrate the security of banks and retailers and steal hundreds of millions in customer records.
Shutterstock
JPMorgan Chase early last month disclosed that cyber thieves pilfered account data on 76 million households and seven million small businesses over the summer, one of the biggest breaches ever and only…
First rule of advertising: don’t believe the advertising.
Bloomua/Shutterstock
At the recent Information Security Solutions Europe conference, former White House cybersecurity adviser Howard Schmidt claimed that most security threats may be persistent, but are not as “advanced” as…
Roll up, roll up for your free money.
Kaspersky Lab
How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced computers to shut down, knocked…
The internet has made crime bigger in scope and easier in practice.
Photosani/Shutterstock
Criminals have always done their best to use new technology to their advantage and the rapid development of new digital technologies and online markets has provided the criminal entrepreneur with as much…
Better bash that bash bug, big time.
isak55/Shutterstock
A first and quite reasonable thought readers may have will be to wonder: what is bash? When you use a computer you probably interact with it through a point-and-click, visual interface such as Windows…
Stolen credit card details, cheaper by the dozen when you buy online.
Chris Young/PA
Imagine if UK banks decided to send out new credit cards to all their customers, but they were all “lost in the post” and the details ended up for sale on some dubious website. The recently discovered…
The investigation of the hack that gave the world access to hundreds of nude celebrity pictures identified another massive gap in online security. Given Apple’s reputation of being among the more secure…
Over the past few months, the Android platform developed by Google and based on the Linux operating system has been having a difficult time. Hackers, with malicious intent and those without, have been…
Confused? You will be if someone’s making mischief with them.
Julen Parra
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercept data or take control of…
Mouses not guns, a future view of the battlefield.
Carrie Kessler/USAF
President Bush is reported to have said: “When I take action, I’m not going to fire a US$2m missile at a US$10 empty tent and hit a camel in the butt. It’s going to be decisive.” As the quote suggests…