“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
The Twittersphere is abuzz about the news on Monday that ISIS or their affiliates are suspected of hacking and compromising the US Central Command’s official Twitter account. As of Monday afternoon in…
While there is only one world power on the internet, that situation will not last forever. The internet’s underpinning technologies were mostly created in the US, the initial networks were based there…
JPMorgan Chase early last month disclosed that cyber thieves pilfered account data on 76 million households and seven million small businesses over the summer, one of the biggest breaches ever and only…
Who’s in your network, checking out your data? The latest invasive digital creature is Sandworm, a piece of malware discovered to be using a previously unknown Windows vulnerability to infiltrate government…
President Bush is reported to have said: “When I take action, I’m not going to fire a US$2m missile at a US$10 empty tent and hit a camel in the butt. It’s going to be decisive.” As the quote suggests…
In a war – declared or otherwise – bravery and perseverance are not enough. Communications are important. Effectiveness means being able to command your troops and gather information. It also means being…
South Korea has made a suprisingly public announcement that it plans to develop cyber-weapons for potential use against North Korea. The decision to make its plans known is baffling and the potential consequences…
As business leaders and politicians gather in Davos to discuss how to reshape the world, one of the topics on their agenda will be cyber-resilience, which is all about preparing organisations and individuals…
Of the many tricks used by the world’s greatest military strategists, one usually works well – taking the enemy by surprise. It is an approach that goes back to the horse that brought down Troy. But surprise…
In Dragon Day – a provocative new movie on release in the US in November – we see the consequences of a “cyber 9/11”. China has attacked the critical infrastructure of the US in a large-scale cyber-attack…
Professor in Law and Co-Convener National Security Hub (University of Canberra) and Research Fellow (adjunct) - The Security Institute for Governance and Leadership in Africa, Faculty of Military Science, Stellenbosch University- NATO Fellow Asia-Pacific, University of Canberra