The padlock symbol simply means that the data being sent between the web server and the user’s computer is encrypted and cannot be read by others. But many people don’t know that.
The policy, to be released on Wednesday by O'Neil, who is Minister for Home Affairs and Minister for Cyber Security, is also designed to enable victims to bounce back faster from attacks that can’t be prevented
Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
Port operator DP World handles roughly 40% of Australia’s sea freight. Over the weekend its ports were disrupted by what appears to be a malicious, targeted cyberattack.
Remote workers lack the same institutional cyber protection as their in-office colleagues.
Maskot/Getty Images
A survey of remote and office workers found that people working from home were more likely to take steps to protect themselves against cybersecurity threats.
The draft bill has a number of issues, ranging from an insecure mechanism that leaves people’s data vulnerable to attacks, to a lack of mandatory disclosure of data breaches.
A new type of spyware means those online ads could go from annoying to menacing.
AP Photo/Julio Cortez
You probably won’t be targeted by spyware, but if you are, odds are you won’t know about it. The latest spyware slips in unseen through online ads as you go about your digital life.
The Security Intelligence Service needs public support and trust to do its work well. Adding a degree of transparency to it’s annual threat assessment should help.
Scammers have exploited a simple weakness in the myGov online portal to redirect hundreds of millions of dollars in tax refunds.
One-third of customers will return to a hacked site without even changing their password, according to a recent study.
d3sign/Moment Collection/Getty Images
Companies tend to focus on appeasing angry customers after a data breach. New research shows they may want to pay more attention to customers who are afraid to return to their site.
Kurt Eichenwald, left, The Conversation’s investigative editor, and Georgia State professor David Maimon working.
The Conversation
Why The Conversation U.S. started an investigative unit.
Peter Dutton walks past a screen outlining cyber attacks around the world while visiting the Australian Signals Intelligence Directorate in March last year.
Mick Tsikas/AAP
Much of the history of signals intelligence in Australia – revealing secrets and protecting one’s own – is tacit and poorly understood. A new book lifts the lid on this world.
Over the years Australia has been quick to point the finger at China – most recently in relation to DJI drones. Instead, we should look closely at our own tech security policies.
This orbiting museum in the show ‘Star Trek: Picard’ plays a key role in fending off a futuristic form of cyberattack.
Courtesy Paramount
Richard Forno, University of Maryland, Baltimore County
‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.