Google’s Android now dominates 80% of the smart phone market. Of the major phone operating systems, Android is the most vulnerable to security breaches and yet perceptions haven’t caught up with reality…
There are many tales in literature over millennia about people selling their soul to a malevolent deity for the right price. But at least it’s usually a good price. Recent research has discovered that…
New bugs in the code for OpenSSL.
Flickr/Guilherme Tavares
Computer system administrators around the world are groaning again as six new security problems have been found in the OpenSSL security library. OpenSSL is a security tool that provides facilities to other…
It’s little wonder that computer experts are warning that computer users could be experiencing “notification fatigue” after the past few weeks. But even if you’re feeling overwhelmed following the Heartbleed…
What do you mean ‘IHATECAT’ is not a strong password?
konsvi
Several high-profile security breaches have, of late, got many people wondering about their passwords. It would be great news if I could tell you a perfect sure-fire system to manage your passwords; the…
The internet’s original auction site is in a spot of bother.
cytech
The latest internet giant to have its security compromised is eBay. A database containing user information has been hacked, leaving potentially millions of people vulnerable. The revelation is clearly…
Who is really in charge of an organisation’s IT security?
Flickr/Pacific Northwest National Laboratory
How do organisations and their Information Technology departments rate when it comes to protecting themselves and their organisations against the ever present cyber risks and cybercrime? The answer is…
The US Justice Department says members of the People’s Liberation Army hacked into US businesses to steal trade secrets.
Jim Lo Scalzo/AAP
In a surprising move, a US District Court has charged five members of the Chinese military with hacking six US companies to obtain commercial secrets over the last eight years. The move has been denounced…
You could hire an army to protect yourself. Or just do your research.
Michael Li
There is nothing worse than having a fake healer offer a cure that does absolutely nothing. History is full of tales of frauds and quacks offering a cure for all, which eventually turn out to be nothing…
More than 5 million Australians were victims of cybercrime in 2012 and cyber breaches are only going to get bigger and more disruptive.
Jim Prosser/Flickr
The recently released Commission of Audit report recommends that the Australian government needs to become “digital by default”. The continued shift to digital service delivery is intended to reduce costs…
Popular web browser Internet Explorer the target for the latest security vulnerability.
Flickr/Hash Milhan
It seems hardly a week goes by without a major cyber security flaw exposed that could be exploited across millions of internet and mobile connected devices. This week it was the Internet Explorer browser’s…
Take a duster to your password collection. It’s as good a time as any.
Karen Blakeman
The web is full of scare stories about the Heartbleed security vulnerability but panicking won’t help. Better to use this situation as an opportunity to clean up our acts. Few of us do it but we should…
Don’t break your heart over this issue but stay secure.
Optx
If you’re struggling to understand the deluge of information about the Heartbleed vulnerability, you’re not alone. Some reports tell us to change all our online passwords immediately, others warn us that…
The CIA and the congressional committees charged with overseeing it are fighting again. With a report on the agency’s post-9/11 interrogation practices still not forthcoming, senate intelligence committee…
The 21st Century’s most deadly weapon?
Ciccio Pizzettaro
Some recent high-profile crimes have got people thinking about how we should handle those who break the law using digital technologies. Criminal sentencing is decided by the type of crime and a range of…
After 25 years, it’s getting a bit dusty in there.
Arrqh
Most people would agree with the principle that good foundations are essential to any structure that is intended to last. But what if when you started building, you didn’t envisage how large, complex or…
You don’t even need a match to burn a digital book.
Jason Verwey
Not all violence in war and conflict is simply strategic. And not all the destruction that takes place is a consequence of territorial or geopolitical objectives. Taking over the next village, blocking…
@N has spent months trying to get his username back from thieves.
Twitter
Joyriding – stealing a car just for the fun of it – is a signature act of troublemaking teenagers seeking excitement and a chance to show off their bravado. But while car theft is among the most common…
Businesses battling to keep their information safe pricked up their ears last week as it was announce that Boeing has produced a mobile phone that self-destructs should the wrong person try to use it…
Something fishy going on in the next cubicle? Check your inbox for clues.
Mark Drago
Most office workers send dozens of electronic communications to colleagues in any given working day, through email, instant messaging and intranet systems. So many in fact that you might not notice subtle…