Malware

NARROWER TERMS
Strategy

Ransomware action plan

This document outlines the capabilities and powers that Australia will use to combat ransomware, seeks feedback on other regulatory reforms or voluntary incentives needed to promote the cyber security resilience of our digital economy, and provides information on where victims can go for help.​
Report

Listening to users and other ideas for building trust in digital trade

This paper argues that if trade policy-makers truly want to achieve data free flow in digital trade they must address public trust and user concerns beyond privacy.
Report

Malware in spam email: risks and trends in the Australian Spam Intelligence Database

Fighting spam requires a combination of technology and crime prevention strategies. This report suggests that the creation of effective partnerships between law enforcement agencies and stakeholders, such as ISPs and the private sector, is vital.
Article

From drone swarms to modified E. Coli: say hello to a new wave of cyberattacks

Earlier this month, researchers created an AI-driven malware that can be used tohack hospital CT scans, generating false cancer images that deceived even the most skilled doctors.
Report

The life and times of cybersecurity professionals

In 2017, the Enterprise Strategy Group (ESG) and the Information Systems Security Association (ISSA) teamed up for the second year in a row to look at the lives and experiences of cybersecurity professionals. This year’s report is based on data from a survey of 343...
Report

Australian Cyber Security Centre threat report 2017

The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
Commentary

Spyware merchants: the risks of outsourcing government hacking

This article argues that there needs to be more transparency, oversight and strong steps toward developing a robust framework of accountability for both the government and private spyware companies.
Report

Spam and criminal activity

The rapid growth of the internet is transforming how we engage and communicate. It also creates new opportunities for fraud and data theft. One way cybercriminals exploit the vulnerabilities of new technologies and potential victims is the use of deceptive emails on a massive scale.
Report

The Australian internet security initiative: interviews with industry participants

Based on interviews with participants in the AISI, this report reveals how the AISI is valued and the important role it plays in how internet service providers manage malware. Executive summary The Australian Internet Security Initiative (AISI) is a program operated by the Australian Communications...
Report

Surfing on thin ice: consumers and malware, adware, spam and phishing

This research investigates Australian residential consumers’ experiences with e-security and identifies areas of concern and their implications on telecommunications policy and regulation. Findings and recommendations have been formed through a literature review and an online survey of 254 Australian consumers. In age, gender and location...