For at least a decade and a half, Chinese hackers have conducted a widespread campaign of industrial cyber espionage, targeting private sector companies in an effort to steal intellectual property, trade secrets and other information that could help China become economically more competitive.
This guide aims to assist you in developing and implementing an effective data breach response. It outlines the requirements relating to data breaches in the Privacy Act 1988 (Cth) (Privacy Act), including personal information security requirements and the mandatory data breach reporting obligations of the...
The 2017 threat report includes insights into how the Australian Cyber Security Centre (ACSC) works and highlights some of the ways in which we have both proactively and reactively responded to cyber threats.
This article argues that there needs to be more transparency, oversight and strong steps toward developing a robust framework of accountability for both the government and private spyware companies.
The Australian government has released this comprehensive cyber security survey, published by the Australian Cyber Security Centre (ACSC), of Australian government and major businesses of national significance.
This report should be viewed as a companion to the ACSC 2016 Threat Report . Both reports...
The new Ambassador for Cyber Affairs says Australia is a target for cyber espionage, but he has not singled out any specific nation as a threat.
As the United States is grappling with explosive findings that Russia engaged in hacking during the Presidential election,...
On December 9, 2016, President Barack Obama directed the Intelligence Community to conduct a full review and produce a comprehensive intelligence report assessing Russian activities and intentions in recent U.S. elections. We have completed this report and briefed President Obama as well as President-elect Trump...
The Australian Cyber Security Centre (ACSC) Threat Report continues to reflect the experience, focus, and mandates of the ACSC's member organisations. This report provides an insight into what the centre has been seeing, learning, and responding to, focusing on specific areas of change or new...
Based on customer data, this report details trends across email, social media platforms and mobile applications to reveal attacker behaviors.
Life imitated art in 2015 as real-world cyber criminals every day applied the mantra of the anti-hero hacker of the...
The number, type and sophistication of cyber security threats to Australia and Australians are increasing. Due to the varied nature of motivations for cyber adversaries targeting Australian organisations, organisations could be a target for malicious activities even if they do not think the information held...
This document represents the process and reflections on the creation and curation of an open source 'texthack' for a media studies textbook for students in Australia, New Zealand, and the Pacific. This document is provided as a resource for anyone contemplating a similar texthack project....
Australians are now sharing more personal information online with friends, family and the broader community. This paper presents the Government's response to the potential safety and security issues raised by this development.
This the Australian Government's official response to the report of the House...