Computer hacking

Report

GPEN sweep 2019 ‘data breach notifications’

The 2019 Global Privacy Enforcement Network (GPEN) Sweep considered how organisations in various jurisdictions handle and respond to data breaches.
Journal article

Makerspaces and urban ideology: the institutional shaping of fab labs in China and Northern Ireland

Makerspaces—specifically those with a focus on digital fabrication and physical computing—are emerging as symbols of social and economic change in many cultures. This paper argues that processes of institutionalisation within these makerspaces are shaped by the specific urban ideologies they are bound to.
Report

Hacking for cash: is China still stealing western IP

For at least a decade and a half, Chinese hackers have conducted a widespread campaign of industrial cyber espionage, targeting private sector companies in an effort to steal intellectual property, trade secrets and other information that could help China become economically more competitive.
Guide

Data breach preparation and response

This guide aims to assist you in developing and implementing an effective data breach response. It outlines the requirements relating to data breaches in the Privacy Act 1988 (Cth) (Privacy Act), including personal information security requirements and the mandatory data breach reporting obligations of the...
Commentary

The age of the mega-leak

The Panama Papers looked like the culmination of a new era for leakers — and then the Paradise Papers came along. But can we expect action to follow?
Report

Australian Cyber Security Centre threat report 2017

The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
Report

The cookbook: A discussion on the process, pitfalls and successes of hacking an open textbook

This document represents the process and reflections on the creation and curation of an open source 'texthack' for a media studies textbook for students in Australia, New Zealand, and the Pacific. This document is provided as a resource for anyone contemplating a similar texthack project...
Commentary

Spyware merchants: the risks of outsourcing government hacking

This article argues that there needs to be more transparency, oversight and strong steps toward developing a robust framework of accountability for both the government and private spyware companies.
Discussion paper

Digital technologies: draft for consultation

The Ministry of Education now invites submissions on the draft Digital Technologies Hangarau Matihiko (DT HM) curriculum.
Report

Securing democracy in the digital age

The 2016 US presidential election demonstrated the increasingly complex cyber and information environment in which democracies are operating.