More than 5 million Australians were victims of cybercrime in 2012 and cyber breaches are only going to get bigger and more disruptive.
Jim Prosser/Flickr
The recently released Commission of Audit report recommends that the Australian government needs to become “digital by default”. The continued shift to digital service delivery is intended to reduce costs…
Popular web browser Internet Explorer the target for the latest security vulnerability.
Flickr/Hash Milhan
It seems hardly a week goes by without a major cyber security flaw exposed that could be exploited across millions of internet and mobile connected devices. This week it was the Internet Explorer browser’s…
Probably an unnecessary precaution.
Redcorn Studios [Matt]
As each new computer virus attack or vulnerability comes to light, millions instinctively check their computer to see if their anti-malware application is up to date. This is a good idea and they are wise…
The internet didn’t fall to pieces at the millennium and it won’t now.
drinksmachine
Take a moment to jump back in your mental time machine to 31 December 1999. It was the biggest New Year’s Eve for a thousand years. The dawn of a new millennium. But as we prepared to party, the world…
Emailing from the car: fast, convenient and not in the least bit secure.
rheauchyr
Cyber security has been a hot item on the UK government agenda in the last few years. Francis Maude of the Cabinet Office is the minister in charge. So if anyone was looking for answers in this area, his…
Does Heartbleed expose flaws in the way some security-critical software is developed?
Flickr/Kaleenxian
The Heartbleed bug that’s potentially exposed the personal and financial data of millions of people stored online has also exposed a hole in the way some security software is developed and used. The bug…
Take a duster to your password collection. It’s as good a time as any.
Karen Blakeman
The web is full of scare stories about the Heartbleed security vulnerability but panicking won’t help. Better to use this situation as an opportunity to clean up our acts. Few of us do it but we should…
Don’t break your heart over this issue but stay secure.
Optx
If you’re struggling to understand the deluge of information about the Heartbleed vulnerability, you’re not alone. Some reports tell us to change all our online passwords immediately, others warn us that…
Cryptolocker, a particularly vicious form of malware that first appeared in September 2013, is a game-changer. After getting into your computer, it will encrypt all your data files, from your word documents…
The CIA and the congressional committees charged with overseeing it are fighting again. With a report on the agency’s post-9/11 interrogation practices still not forthcoming, senate intelligence committee…
The 21st Century’s most deadly weapon?
Ciccio Pizzettaro
Some recent high-profile crimes have got people thinking about how we should handle those who break the law using digital technologies. Criminal sentencing is decided by the type of crime and a range of…
You don’t even need a match to burn a digital book.
Jason Verwey
Not all violence in war and conflict is simply strategic. And not all the destruction that takes place is a consequence of territorial or geopolitical objectives. Taking over the next village, blocking…
Businesses battling to keep their information safe pricked up their ears last week as it was announce that Boeing has produced a mobile phone that self-destructs should the wrong person try to use it…
What’s worse than an enemy with a gun? An enemy with malicious code.
Niall Carson/PA Archive/Press Association Images
South Korea has made a suprisingly public announcement that it plans to develop cyber-weapons for potential use against North Korea. The decision to make its plans known is baffling and the potential consequences…
Something fishy going on in the next cubicle? Check your inbox for clues.
Mark Drago
Most office workers send dozens of electronic communications to colleagues in any given working day, through email, instant messaging and intranet systems. So many in fact that you might not notice subtle…
The massive release of the US National Security Agency (NSA)’s classified documents by Edward Snowden continues to raise questions about security. One of these documents deals with the NSA’s classified…
Memorable and secure. Really nailed this one.
reidrac
It’s as easy as “123456”, or so we’ve learned from Splashdata’s annual worst password of the year list. Slipping down to number two in this most recent list was last year’s favourite, the ever-popular…
Davos attendees compare firewall software.
World Economic Forum
As business leaders and politicians gather in Davos to discuss how to reshape the world, one of the topics on their agenda will be cyber-resilience, which is all about preparing organisations and individuals…
Can you spot your Facebook data?
National Security Agency
President Obama faced a difficult task in his speech on reform of the NSA’s surveillance activities. As an accomplished orator, crafting a well-received speech was obviously within his capabilities, but…
Disabling a country’s electricity with the click of a button.
usairforce
Of the many tricks used by the world’s greatest military strategists, one usually works well – taking the enemy by surprise. It is an approach that goes back to the horse that brought down Troy. But surprise…