Tag:Cybersecurity

1
Australian Government legislates to protect critical national infrastructure
2
Politicians accused of stealing data?
3
US Department of Homeland Security unveils five point strategy to combat cyber risk
4
Internet of Things security flaw – key card locks vulnerable
5
Drive to Expand Australian Cyber Spy Powers
6
DNA Profiles shared online lead to serial killer’s arrest
7
Russian-backed hacking targets Australian businesses
8
Over half of notifiable data breaches caused by human error
9
The death of the passwords?
10
Mark Zuckerberg testifies: what you need to know

Australian Government legislates to protect critical national infrastructure

By Cameron Abbott, Keely O’Dowd and Sarah Goegan

Protecting Australia’s critical infrastructure from threats is essential to Australia’s national security interests, community safety and the overall quality of life for Australians.

In March 2018, the Australian Parliament passed the Security of Critical Infrastructure Act 2018, which is due to commence on 11 July 2018. The Act imposes new obligations on operators and owners of “critical infrastructure assets” – Australia’s high risk major ports and electricity, water and gas utilities.

Read More

Politicians accused of stealing data?

By Cameron Abbott and Sarah Goegan

No it’s not Chinese or Russian hackers trying to influence elections. A candidate in the Ontario province elections in Canada has resigned following allegations he may have stolen data from his former employer to further his party’s campaign.

Read More

US Department of Homeland Security unveils five point strategy to combat cyber risk

By Cameron Abbott and Sarah Goegan

This week, the US Department of Homeland Security (DHS) released its Cybersecurity Strategy. The five “pillar” strategy will be executed by the DHS over the next five years, and aims to improve national cybersecurity risk management.

Read More

Internet of Things security flaw – key card locks vulnerable

Cameron Abbott, Warwick Andersen, Rob Pulham and Georgia Mills

It is a technology so innocuous that it hardly gets a second thought: electronic hotel key cards have been replacing the humble lock and key for over two decades. A recent study by Finnish security researchers has revealed a vulnerability in the technology. The discovery came as a result of the researchers’ obsession over many years to solve a mystery of how a laptop was stolen from a hotel room without leaving a trace. (Small consolation that it cannot have been easy to do given how long it took!)

Read More

Drive to Expand Australian Cyber Spy Powers

By Warwick AndersenRob Pulham and Georgia Mills

Australia’s military cyber spy agency, the Australian Signals Directorate (ASD), could soon be receiving radical new espionage powers to monitor Australian citizens for the first time. If approved, the ASD may be able to secretly access the digital information of Australians including emails, health data, bank records, and text messages.

Read More

DNA Profiles shared online lead to serial killer’s arrest

By Warwick Andersen, Rob Pulham and Sarah Goegan

Last week, California police arrested Joseph James DeAngelo, the man suspected of being the “Golden State Killer” or “East Area Rapist”, a serial killer and rapist who terrorised parts of California in the 1970s and 80s.

Of particular interest is how he came to be arrested, with the help of DNA matched on a genealogy website.

Read More

Russian-backed hacking targets Australian businesses

By Cameron Abbott, Allison Wallace and Sarah Goegan

Russian hackers are accused of penetrating up to 400 Australian businesses in 2017 as part of an alleged state-sponsored cyber-espionage campaign, targeting millions of computers across the world.

The Australian government made the announcement in light of an extraordinary joint statement from the US and UK governments pointing a stern finger at Russia for sponsoring cyber-attacks on government, private organisations, critical infrastructure providers and internet services providers.

Read More

Over half of notifiable data breaches caused by human error

By Warwick Andersen, Rob Pulham and Keely O’Dowd

Following on from Friday’s blog, we have looked at a particular aspect of the Office of the Australian Information Commissioner’s Notifiable Data Breaches Scheme quarterly report in more detail.

Read More

The death of the passwords?

By Cameron Abbott and Allison Wallace

While the recent Facebook saga has underlined the fact that using a password to protect your data doesn’t mean it won’t be improperly accessed, we have become used to needing to create, remember and use passwords in most aspects of our digital lives.

But the humble letter/number/symbol combination may soon be a thing of the past, with a new web standard – the Web Authentication (WebAuthn) – expected to be issued soon.

Read More

Mark Zuckerberg testifies: what you need to know

By Cameron Abbott and Sarah Goegan

Mark Zuckerberg testified before the US Congress in two marathon sessions this week. He was quizzed on topics including Cambridge Analytica and data sharing, privacy law and social media regulation, and Facebook’s policies.

Read More

Copyright © 2024, K&L Gates LLP. All Rights Reserved.