Which operating system is safer from a hack attack?
The argument has been raging for years: which operating system is the safest when it comes to security. Has the latest software upgrades from the tech giants changed anything?
Once a software maker learns about a “zero-day” vulnerability, there’s usually no time left to fix it.
Midnight via www.shutterstock.com
“Zero-days” are serious vulnerabilities in software that are unknown to the software maker or user. They are so named because developers find out about the security vulnerability the day that it is exploited…
In what has been labelled as poetic justice by some, the Hacking Team, an Italian company that sells mass computer and mobile device surveillance software has itself been hacked. The alleged hackers, tweeting…
National priorities can help focus our research efforts.
AAP Image/Lukas Coch
The nine science and research priorities will help focus and coordinate our efforts, and aid government departments in supporting the future of Australian science.
“Unit 61398,” a secretive Chinese military unit believed to be behind many hacking attacks, sits on the outskirts of Shanghai.
Recent data thefts that appear to be carried out by nations are unsettling for many reasons and raise profound questions about how we should handle them.
More than just a cyber “whodunnit.”
Lee Jae Won/Reuters
Many questions remain about the hack on government employee data but the US has to treat the data theft as a high-level diplomatic incident.
The security breach of the Office of Personnel Management (OPM) demonstrates governments have a lot to learn about protecting their documents from cyber attacks.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Claims that a cybersecurity expert hacked an aeroplane's cockpit might not be as unbelievable as they first seem.
There's no excuse for big firms letting basic attacks compromise their customers' data.
Bright colours, dumb ideas.
Oast House Archive
A word of advice: don't try and build your own cryptography. It's hard and others have done it better.
Moving out? Plaid’s plans for relocation are light on the details.
Ben Birchall/PA Wire
Plaid Cymru doesn't have much detail to offer when it comes to defence.
Labour’s defence policy might sound good, but it’s mainly empty rhetoric.
Stefan Rousseau/PA Archive
On defence, the Labour manifesto is full of fine words, but lacking in substance.
The challenge is to keep the cyber criminals locked out of systems.
With cybercrime estimated to cost the global economy upwards of US$400 billion a year -- and expected to rise -- what are the challenges to beating the criminals?
What if the police told you that you were being scammed – would you continue to send money?
An estimated A$75,000 is lost by Australians everyday to online fraud but police are having some success in alerting people before they even know they're being scammed.
Binary systems are not enough if you want to improve security.
As hackers get more sophisticated in their cyber crime efforts we need to look to new technology to make our systems more secure, and potentially unhackable. So how can quantum physics help?
Forensics is a very different business when it comes to technology.
Forensics is changing in the digital age, and the legal system is still catching up in terms of how it uses digital evidence.
We need to take charge and teach ourselves a bit about the internet in order to stay safe online.
There is only so much government and business can do to keep us safe online. Ultimately we need to take personal responsibility for how we use the internet.
These days anyone can download the tools used for cyber crime.
Ivan David Gomez Arce/Flickr
Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
Obama chose Stanford University, the heart of Silicon Valley, to announce measures to defend cyberattacks.
Cybersecurity at the national level requires information sharing across industries and government – emerging models how this can be done effectively.