Last Updated on 5 May 2023 by Daniel Lee Hadlington, De Montfort University The biggest threat to an organisation’s cyber-security comes from within, according to a growing body of evidence. Employees are frequently putting their companies at risk of hacking by sharing their passwords, using public WiFi networks to send sensitive information, or not protecting… Continue reading Are you a “cyberloafer”? Why internet procrastination is making life easier for hackers
Category: Online Security
Airports, ATMs, hospitals: Microsoft Windows XP leak would be less of an issue, if so many didn’t use it
Brianna O’Shea, Edith Cowan University and Paul Haskell-Dowland, Edith Cowan University The source code of the Windows XP operating system is now circulating online as a huge 43GB mega-dump. Although the software is nearly two decades old, it’s still used by people, businesses and organisations around the world. This source code leak leaves it open… Continue reading Airports, ATMs, hospitals: Microsoft Windows XP leak would be less of an issue, if so many didn’t use it
Online predators target children’s webcams, study finds
Last Updated on 3 May 2023 by Daniel Eden Kamar, Hebrew University of Jerusalem and Christian Jordan Howell, University of South Florida There has been a tenfold increase in sexual abuse imagery created with webcams and other recording devices worldwide since 2019, according to the the Internet Watch Foundation. Social media sites and chatrooms are… Continue reading Online predators target children’s webcams, study finds
World War Three is being waged in cyberspace
Mike Sosteric, Athabasca University My introduction to advanced communication technology (i.e. the Internet and World Wide Web) came in 1999. Having grown up in the two-channel universe of the 1960s and ‘70s, I was agog at the power it represented. The technology was nascent at that time — not many web pages yet existed —… Continue reading World War Three is being waged in cyberspace
How we trace the hackers behind a cyber attack
Last Updated on 1 May 2023 by Daniel David Glance, The University of Western Australia The Chinese military has been imputed for the recent cyber attack on the Australian Bureau of Meteorology (BOM). The Chinese government has, of course, denied its involvement. And it does seem somewhat convenient that it is being blamed for this… Continue reading How we trace the hackers behind a cyber attack
Wi-Fi can be KRACK-ed. Here’s what to do next
Last Updated on 30 April 2023 by Daniel David Glance, The University of Western Australia A security researcher has revealed serious flaws in the way that most contemporary Wi-Fi networks are secured. Discovered by Mathy Vanhoef from the University of Leuven, the vulnerability affects the protocol “Wi-Fi Protected Access 2”. Otherwise known as WPA2, this… Continue reading Wi-Fi can be KRACK-ed. Here’s what to do next
Online security won’t improve until companies stop passing the buck to the customer
Last Updated on 28 April 2023 by Daniel Steven J. Murdoch, UCL It’s normally in the final seconds of a TV or radio interview that security experts get asked for advice for the general public – something simple, unambiguous, and universally applicable. It’s a fair question, and what the public want. But simple answers are… Continue reading Online security won’t improve until companies stop passing the buck to the customer
How far should organizations be able to go to defend against cyberattacks?
Last Updated on 27 April 2023 by Daniel Scott Shackelford, Indiana University The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect their digital systems, and the corporate and state secrets stored within. For a long time, cybersecurity experts have erected firewalls to keep out unwanted traffic… Continue reading How far should organizations be able to go to defend against cyberattacks?
Your car is more likely to be hacked by your mechanic than a terrorist
Last Updated on 26 April 2023 by Daniel Richard Matthews, University of Adelaide When it comes to car hacking, you should be more worried about dodgy dealers than one-off hackers with criminal intent. Hollywood would have us believe our cars are extremely vulnerable to hackers. A hacker remotely logs into the onboard computer of a… Continue reading Your car is more likely to be hacked by your mechanic than a terrorist
The much-anticipated defence review is here. So what does it say, and what does it mean for Australia?
Last Updated on 25 April 2023 by Daniel John Blaxland, Australian National University The Albanese government on Monday released a declassified version of the much-anticipated defence strategic review, authored by former defence chief Angus Houston and former defence minister Stephen Smith. The report looks at Australia’s defence equipment and resourcing, but it also looks beyond… Continue reading The much-anticipated defence review is here. So what does it say, and what does it mean for Australia?