Will the US-China relationship devolve into Spy vs Spy?
greyloch/Flickr
The protection of trade secrets is an area of concern for both countries and is more likely to lead to an agreement.
The end of privacy?
Shutterstock
Israel is suspected of spying on Iran’s nuclear talks using a virus to hack the devices that are all around us.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Reuters
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
Sitting duck?
Jeff Wallace/flickr
The internet of things – including the equipment on the power grid – is increasing cybersecurity risks for all critical infrastructure.
More than just a cyber “whodunnit.”
Lee Jae Won/Reuters
Many questions remain about the hack on government employee data but the US has to treat the data theft as a high-level diplomatic incident.
Data mining.
Shutterstock
The security breach of the Office of Personnel Management (OPM) demonstrates governments have a lot to learn about protecting their documents from cyber attacks.
There needs to be rules that govern what takes place in the cloud as there are for what occurs on the ground.
David James Paquin
All interaction depends on rules, written or unwritten, to ensure a smooth ride. But in cyberspace there are none.
Cyber warning.
Shutterstock
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Why did Penn State take so long to disclose the breach?
Laptop image via www.shutterstock.com
The recent cyber attacks at Penn State have put personal information of 18,000 students in the hands of hackers. What should universities do to protect students’ privacy?
In-flight hacking.
Shutterstock
Claims that a cybersecurity expert hacked an aeroplane’s cockpit might not be as unbelievable as they first seem.
Hack attack.
Shutterstock
There’s no excuse for big firms letting basic attacks compromise their customers’ data.
Bright colours, dumb ideas.
Oast House Archive
A word of advice: don’t try and build your own cryptography. It’s hard and others have done it better.
Moving out? Plaid’s plans for relocation are light on the details.
Ben Birchall/PA Wire
Plaid Cymru doesn’t have much detail to offer when it comes to defence.
Attack on TV5 Monde is seen in France as an attack on media freedom.
Yoan Valat/EPA
Once analogue industries go digital, they’d better be prepared for the potential pitfalls of being internet-connected.
When malware stops looking like malware, we’re in for a tough ride.
patterns by cepera/shutterstock.com
Recognising malware patterns is key to the effectiveness of antivirus programs.
Big guns for big jobs.
archer10
With three billion internet users and rising, a device that turns surfers into shells is a dangerous development.
Labour’s defence policy might sound good, but it’s mainly empty rhetoric.
Stefan Rousseau/PA Archive
On defence, the Labour manifesto is full of fine words, but lacking in substance.
The challenge is to keep the cyber criminals locked out of systems.
Flickr/Yuri Samoilov
With cybercrime estimated to cost the global economy upwards of US$400 billion a year – and expected to rise – what are the challenges to beating the criminals?
Soon you will be the key.
face scan by Franck Boston/www.shutterstock.com
The days of the username and password combo may be numbered as biometric security grows more sophisticated.
What if the police told you that you were being scammed – would you continue to send money?
Flickr/jacobfg
An estimated A$75,000 is lost by Australians everyday to online fraud but police are having some success in alerting people before they even know they’re being scammed.