Security

Unlimited government and police control of the internet? There's no filter for that

By Mark A Gregory, RMIT University

Good news. A decision made earlier this month by Australia’s Minister for Broadband, Communications and the Digital Economy Senator Stephen Conroy may have inadvertently opened the door for unlimited government and police control of the internet.

On November 9, Senator Stephen Conroy said:

The next generation of digital assaults

Business Spectator 22 November 2012

Imagine trying to connect to the network and finding that you cannot. It’s a frightening scenario that could play out sooner than you think given the technologies being developed and deployed today.

ADFA hack alarm bells

The University of New South Wales (UNSW) Canberra College was hacked into on 15 November 2012 by a hacker known as Darwinaire who is associated with the Anonymous group. The incident has seen private details of thousands of staff and students at the Australian Defence Force Academy (ADFA) pilfered in what is tantamount to a national security failure.

Facebook's privacy tightrope

Facebook may have killed off community voting on privacy policy but is it taking a big risk by not listening to its users?

Facebook is a commercial entity that is navigating a path fraught with danger with the multitude that inhabits the social network left exposed with a bullseye on their backs.

Ending the copyright witch-hunt

Kim Dotcom's new website, Mega, is set to spur on new anti-copyright measures. But is trying to stamp out piracy through litigation and legislation ultimately futile?

In the mad rush to appease movie and music companies, governments around the world have trodden on centuries of legal precedent and forced internet service providers to become unwilling proxies in what is a corporate law matter between copyright holders and pirates.

Explainer: what is a virtual private network (VPN)?

By Mark A Gregory, RMIT University

Have you ever wanted to exist in more than one place at the same time?

The laws of physics suggest wormholes through space and time are hypothetical; but wormholes do exist in cyberspace and wonders can be found on the other side.

The cyber war rulebook

War has always been a dirty business, both bloody and chaotic, but that hasn’t stopped us from imposing codes of conduct on combat. They might not mean a lot in the heat of battle or be relevant to achieving strategic objectives, but they are there for a reason.

How do I: Securely share files with business partners

Read the original article here

Read the full article below

Set up an online document safe.

Sharing documents with your business partners should not be onerous but does require some caution to ensure the documents reach their intended recipients and don’t end up in the hands of your competitors or those that wish to damage your business.

Why Conroy must answer for ASIC’s internet blockade

Over the past nine months the Australian Securities and Investment Commission (ASIC) has used Section 313 of the Telecommunications Act 1997 to force Internet Service Providers (ISPs) to block access to websites deemed by ASIC to be carrying out a criminal activity.

Can data breach notification laws survive the election?

Read the original article on The Australian

Read the article below

The Privacy Alerts Bill 2013 missed the cut during the last Senate sitting day and that means that the proposed move to make companies more responsible with customer data, sits in a legal limbo for now.