Researchers in Singapore have demonstrated how hackers can use a smartphone mounted on a drone to steal data intended for wireless printers. The technology detects an insecure printer and intercepts documents by establishing a fake …
A fortnight ago, a group purporting to be the Islamic State Hacking Division released the names, email addresses, passwords and telephone numbers of almost 1,500 individuals, the majority of whom are reportedly US Defence personnel. …
Tony Abbott’s Telecommunications Sector Security Reforms continues to cause angst with major telco and tech firms. The proposed amendments to legislation including the Telecommunications Act and Telecommunications (Interception and Access) Act would force telcos to …
The nature of ISIS’s online presence is intended to do three things. Firstly, and most importantly for the longevity of its existence, it’s intended as a mechanism to attract and recruit members to its ranks. …
The use of social media by extremist groups continues to trouble policymakers and police forces across the globe. The sophisticated use of online platforms by groups such as ISIS have spurred governments in Europe to …