In just five years, malware construction kits will be so easy to use, and embedded processors will provide such easy targets, that a disgruntled paper boy might hack your refrigerator.
The Full Tilt
Stilgherrian delivers an undiluted dose of criticism and analysis of the ways digital technology is changing our world and the spin that goes with it.
Stilgherrian is a freelance journalist, commentator and podcaster interested in big-picture internet issues, especially security, cybercrime and hoovering up bulldust. He studied computing science and linguistics before a wide-ranging media career and a stint at running an IT business. He can write iptables firewall rules, set a rabbit trap, clear a jam in an IBM model 026 card punch and mix a mean whiskey sour.
Identity theft is easy to commit, as Welsh comedian Bennett Arron discovered. He explains just how easy on this week's Patch Monday podcast.
Steve Jobs might now be known for such mainstream technology as the iPhone, iPad and Macintosh, but his first creation with hardware genius Steve Wozniak was illegal.
Adobe has taken a few security hits lately, from the Flashback Mac Trojan and another zero-day exploit in Flash Player to malware-laden PDF files being the hacker's weapon of choice. So what gives?
Cyberwar has been big news this year, from Stuxnet to claims that China has a massive cyber warfare capability. But what is it, exactly?
For a organisation that analyses 180,000 new malware samples every day, SophosLabs is a remarkably peaceful place. The fight against cybercrime is a well-rehearsed routine.
Five years ago, cyber criminals were generally individual IT experts who had turned to crime. Today, they're professional criminals turning to the internet, hiring the IT talent that they need.
When it comes to online security, can we ever overcome basic human nature? It seems that people are always too trusting, and the bad guys are always getting better at taking advantage of that trust.
Google demands that users of its Google+ social network be identified by their real names. It's a bad policy that's been badly implemented, but is it proof that Google just doesn't get people?
Hacking for political and economic purposes isn't getting the attention it deserves, says McAfee's vice president of threat research Dmitri Alperovitch, who uncovered the Operation Shady RAT hacks.
Shadow Communications Minister Malcolm Turnbull has been spruiking coalition broadband policy this month. A core point, he says, is that there are no applications for National Broadband Network (NBN) speeds of 100 megabits per second (Mbps). Is he right?
"An insider who's gone bad can do more damage to your network than almost any hacker can do from the outside," says Dr Paul Nielsen, director and chief executive officer of the Software Engineering Institute (SEI).
It's the consumerisation of the enterprise; employees expect to use Facebook, Twitter and applications beyond the standard operating environment (SOE). How do you manage that securely?
An R18+ classification for computer games is long overdue in Australia and internet filtering based on the Interpol blacklist is "reasonable enough", says legal expert Peter Black. However, he does have concerns.
The cloud has levelled the playing field for business, says Amazon's chief technology officer Dr Werner Vogels. Ten years ago, a start-up needed $5 million. Now, Vogels says, it's "just $50,000 and a coffee shop around the corner".