Mike Burgess, Telstra’s Chief Information Security Officer, claims that attributing blame for cyberattacks is a ‘distraction’. It’s hard not to empathise with his views when, according to the Australian Centre for Cyber Security, 85% of …
Researchers in Singapore have demonstrated how hackers can use a smartphone mounted on a drone to steal data intended for wireless printers. The technology detects an insecure printer and intercepts documents by establishing a fake …
Beyond the occasional doom-laden and shouting headline about the coming ‘cyber apocalypse’, few column inches are devoted to the cyber policy and international security space. This is a shame, because if you were to look …
Command and control were key naval unknowns in August 1914. What hadn’t been properly appreciated in set-piece, largely visually conducted exercises before the war were the problems with radio. The full conceptual and practical difficulties …
China and the US have stolen the show this week with their negotiations of what may become the world’s first major arms control agreement for cyberspace. Bilateral discussions focus on establishing a no first use …