While you’re here… help us stay here.

As we confront the economic impacts of the pandemic, we need your support even more. So that we can continue to bring you the latest in policy and research, please donate to APO.

Malware

NARROWER TERMS
Report

Malware in spam email: risks and trends in the Australian Spam Intelligence Database

Fighting spam requires a combination of technology and crime prevention strategies. This report suggests that the creation of effective partnerships between law enforcement agencies and stakeholders, such as ISPs and the private sector, is vital.
Article

From drone swarms to modified E. Coli: say hello to a new wave of cyberattacks

Earlier this month, researchers created an AI-driven malware that can be used tohack hospital CT scans, generating false cancer images that deceived even the most skilled doctors.
Report

The life and times of cybersecurity professionals

In 2017, the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) teamed up for the second year in a row to look at the lives and experiences of cybersecurity professionals. This year’s report is based on data from a survey of 343...
Report

Australian Cyber Security Centre threat report 2017

The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
Commentary

Spyware merchants: the risks of outsourcing government hacking

This article argues that there needs to be more transparency, oversight and strong steps toward developing a robust framework of accountability for both the government and private spyware companies.
Report

Zero days, thousands of nights

Zero-day vulnerabilities — software vulnerabilities for which no patch or fix has been publicly released — and their exploits are useful in cyber operations — whether by criminals, militaries, or governments — as well as in defensive and academic settings. This report provides findings from...
Article

HKCSView: Gone phishing

In the recent past phishing was an attempt to reveal personal information; passwords; bank and credit card numbers, usually within spam email that purports to be from a well-known legitimate enterprise. Phishing is rapidly evolving from attempting to just steal information to also be the...
Report

Spam and criminal activity

The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale.
Report

The Australian internet security initiative: interviews with industry participants

Based on interviews with participants in the AISI, this report reveals how the AISI is valued and the important role it plays in how internet service providers manage malware. Executive summary The Australian Internet Security Initiative (AISI) is a program operated by the Australian Communications...
Report

Surfing on thin ice: consumers and malware, adware, spam and phishing

This research investigates Australian residential consumers’ experiences with e-security and identifies areas of concern and their implications on telecommunications policy and regulation. Findings and recommendations have been formed through a literature review and an online survey of 254 Australian consumers. In age, gender and location...