Improved cybersecurity for governments and the private sector is expected to feature in US President Barack Obama’s annual State of the Union Address delivered on Tuesday night (US time) to Congress. The…
In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
Is The Interview a good movie? We may never know. After the theft by North Korean hackers of vast quantities of confidential emails, pay information and unreleased film scripts, the drip-drip leaking of…
We live in a world increasingly dominated by our personal data. Some of those data we choose to reveal, for example, through social media, email and the billions – yes, billions – of messages, photos and…
The recent cyber attack on Sony Pictures was so extensive there were notices placed on the entrance doors telling staff not to log in to the company’s network when they reached their desks. Sony’s entire…
Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
An ever-increasing number of our consumer electronics is internet-connected. We’re living at the dawn of the age of the Internet of Things. Appliances ranging from light switches and door locks, to cars…
If cyber-crime is the tier one (most serious) threat that we are told it is, and we are experiencing upwards of 2-3 million cyber-threats each year, then why have we only had 350 or so prosecutions under…
You might have seen reports that the Australian Signals Directorate (ASD) has issued cyber security advice ahead of the G20 Leaders Summit in Brisbane this weekend. So under the watchful eye of the media…
JPMorgan Chase early last month disclosed that cyber thieves pilfered account data on 76 million households and seven million small businesses over the summer, one of the biggest breaches ever and only…
At the recent Information Security Solutions Europe conference, former White House cybersecurity adviser Howard Schmidt claimed that most security threats may be persistent, but are not as “advanced” as…
How safe is Microsoft Windows? After all, the list of malware that has caused major headaches worldwide over the last 15 years is long – viruses, worms and Trojans have forced computers to shut down, knocked…
Criminals have always done their best to use new technology to their advantage and the rapid development of new digital technologies and online markets has provided the criminal entrepreneur with as much…
A first and quite reasonable thought readers may have will be to wonder: what is bash? When you use a computer you probably interact with it through a point-and-click, visual interface such as Windows…
Imagine if UK banks decided to send out new credit cards to all their customers, but they were all “lost in the post” and the details ended up for sale on some dubious website. The recently discovered…
The investigation of the hack that gave the world access to hundreds of nude celebrity pictures identified another massive gap in online security. Given Apple’s reputation of being among the more secure…
Over the past few months, the Android platform developed by Google and based on the Linux operating system has been having a difficult time. Hackers, with malicious intent and those without, have been…
The growing extent to which our day-to-day infrastructure is computer-controlled and internet-connected leaves it open to the possibility that malicious hackers could intercept data or take control of…
President Bush is reported to have said: “When I take action, I’m not going to fire a US$2m missile at a US$10 empty tent and hit a camel in the butt. It’s going to be decisive.” As the quote suggests…
Andy Coulson, the former editor of the News of the World newspaper who rose to be David Cameron’s head of communications, has been found guilty of conspiracy to hack mobile phones. His former colleague…