Tech
Op-Ed: Quantum computing — the next cyber battleground
Australia’s ambitions in quantum computing are not new. There has been ongoing domestic research for a long time, ...
Twitter adds encrypted messaging — but only for verified, blue tick accounts
Twitter has announced it is implementing a long-awaited encrypted messaging function, and while it does currently work, ...
Google introduces new safety features, including dark web scanning for email addresses
Google has announced a raft of new safety features at its annual Google I/O developer conference, aimed at protecting ...
Op-Ed: Australia looks to privacy-preserving checks for legitimate website and app use
Australian application and website owners have been battling with bot traffic for some years now. Some of these ...
Is Google’s new passkey security option the end of passwords as we know it?
Google announced this week that it has rolled out a new way to log into a Google account that does away with passwords ...
Samsung bans internal ChatGPT user after source code leak
Korean technology giant Samsung has announced an internal ban on the use of AI chatbot ChatGPT, the company announced to ...
Op-Ed: World Password Day is about more than just passwords — identity management matters too
Passwords have undergone an evolution in recent years and with good reason.
Op-Ed: Why ‘voice cloning’ won’t help fraudsters beat biometrics
You may have seen the recent headlines from a few journalists who have used artificial intelligence (AI) to create ...
Apple rolls out its 1st Rapid Security Response update to the public
Apple has utilised its Rapid Security Response feature overnight to roll out its first such update.
Medusa threat actor boasts about spreading Microsoft’s Bing source code
The Medusa ransomware outfit is sharing what it claims to be the leaked source code of two of Microsoft’s Bing products ...
Op-Ed: Operational technology under attack from rising cyber security threats
The past few months have seen cyber attacks hit nearly every single industry in Australia, across the government and the ...
Old routers are revealing important corporate secrets — is yours one of them?
A pair of security researchers recently lucked onto an alarming statistic — it would appear that perhaps half of the ...
How hackers exploit Discord: A case study
Recent research has detailed how hackers have been able to leverage Discord’s integrations for financial and political ...