People worry that Google is accepting code from the NSA and pushing it into Android, but really, don't we want some of those code breakers showing us how to do it right?
A Sydney, Australia-based journalist, Michael Lee covers a gamut of news in the technology space including information security, state Government initiatives, and local startups.
When is two-factor authentication not? When it's as bypassable as Yahoo's.
Another report, another 'cyber' initiative. But we've been putting these projects, proposals, and plans out for years with very little difference in results or agenda. Which makes me wonder: Do we even understand what the 'cybers' are?
We need to have a lower tolerance for lax security, but we also need to encourage those that are actually trying to do the right thing.
The latest beta version of Red Hat's Fedora operating system now chooses not to mask passwords by default in its installation, but should this become a standard practice?
Hackers have claimed to have broken into the Commonwealth Bank of Australia's UK site, but with the bank denying any attack, is this just another case of putting one and one together and getting three?
Just the other week, we heard that the Australian Tax Office was storing passwords in plain text. This time, it's one of the UK's intelligence agencies.
Attackers can apply for the security certificates for gTLDs that are yet to be approved, and many legitimate websites may already have certificates that could allow them to conduct man-in-the-middle attacks on gTLDs.
Chinese spies! Advanced persistent threats! Sophisticated "cyber" attacks! They're just buzzwords for attacks that are happening all the time, so why be surprised?
What's worse than a clueless security team that doesn't care about securing the details it receives? One that you're paying for with your tax dollars.