The ATO crash didn’t involve a fire, but it almost looked that bad for a while.
The ATO system crash was unusual, but it was handled as well as could be expected.
If only it were this easy.
'Keyboard' via shutterstock.com
People who think like hackers have some really good ideas about how to protect digital privacy during turbulent times. We can learn from them.
Businesses need to consult customers to work out what is reasonable when it comes to using and securing their data.
Business Briefing: Trusting business to take care of your data.
The Conversation 14.7 MB (download)
Businesses need to take the lead to show customers and governments that industry can handle data management, says former ACCC chief Graeme Samuel.
A new type of computer means we’ll need a new way to make our data secure.
The ABS has safeguards to protect privacy and secure data collected in the census.
Privacy fears over longer retention of names and addresses in Census 2016 are understandable, but are also misinformed and exaggerated.
If we’re super-wired in the future, will we also be super-vulnerable?
Imagining possible futures can help us plan a secure information technology environment for the years to come.
How many attempts will it take to unlock this phone?
Phone with lock and keys via shutterstock.com
The FBI has accessed the data on a shooter’s iPhone. What if the device had been running Android?
Who has your personal data, and how secure is it? Do you even know?
Card and lock image from shutterstock.com
How should we address growing concerns about information security without denying society the benefits big data can bring?
Apple is refusing to back down in its fight with the FBI.
Apple’s refusal to back down in its fight with the FBI is a sharp reversal from just a few years ago when it was the government urging tech companies to do more to protect consumer privacy.
Do not adjust your set.
Museum of Malware
From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.
The pathogens are secured, but are the data about them as well-protected?
Biosafety needs to be about more than personal protective equipment and safe laboratory practices. Don’t forget the cybersecurity.
A new threat to secure online communication could be a symptom of a wider cyber security problem.
Public anxiety and legal protections currently pose a major challenge to anyone wanting to introduce eye-scanning security technologies.
There’s no excuse for big firms letting basic attacks compromise their customers’ data.
Protecting your privacy when your data collected for one use might have a secondary use for other researchers.
Researchers are tapping into some of the massive amounts data collected these days, which could include information about you. But how do they protect your privacy?
Having a shredder or a firewall is not the same as having an information security strategy.
Image sourced from shutterstock.com
There are many ways data can leak from organisations, and as long as companies leave it up to IT to solve, leaks will continue.
If you’ve been hacked or had your identity stolen, time is of the essence when it comes to minimising the damage.
Image sourced from Shutterstock.com
Preventing and responding to the hacking epidemic is not a problem for one group or organisation to solve. And what happens in the first 72 hours can make all the difference.
The consent policies of popular websites would take a month to read. Perhaps including a sign like this would be a simpler solution.
We live in a world increasingly dominated by our personal data. Some of those data we choose to reveal, for example, through social media, email and the billions – yes, billions – of messages, photos and…
Is it a crime scene or just a store checkout? Could be both.
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
Listening in to a conversation can be easy if you have the right code in place.
You don’t have to look far to see how many ways criminals can exploit mobile devices for nefarious purposes. From simple phishing scams to creating fake Wi-Fi networks, the methods in which data can be…