Companies tend to focus on appeasing angry customers after a data breach. New research shows they may want to pay more attention to customers who are afraid to return to their site.
Much of the history of signals intelligence in Australia – revealing secrets and protecting one’s own – is tacit and poorly understood. A new book lifts the lid on this world.
Over the years Australia has been quick to point the finger at China – most recently in relation to DJI drones. Instead, we should look closely at our own tech security policies.
Richard Forno, University of Maryland, Baltimore County
‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.
Sexual predators have found a new way to exploit children: taking control of their webcams to record them without their consent. Here’s how the attack works and how you can protect your kids.
If social media companies are restricted in how they collect, use and share Australians’ data, we can take significant steps toward protecting everyone from foreign interference.
Passwords are both annoying to use and vulnerable to hackers. Google is moving to support stronger, easier-to-use passkeys (and other tech companies are close behind).
Richard Forno, University of Maryland, Baltimore County
The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.