Top Stories Security
- Why Patching Heartbleed Doesn't Fix The Security Time Bomb
- How The Cryptolocker Ransomware Works
- Why You Must Revamp Your Security Strategy (And How To Do It)
- What Every IT Pro Can Learn From Telstra's Customer Data Leak
- Why New Privacy Laws Won't Stop Your Phone Being Tracked
- How Will Australia's New Privacy Laws Work Post-Snowden?
If you have any interest in information security, you’ll know that the last year or so has been nothing short of incredible. Following Edward Snowden’s leaks to the press, we now know that there has been systematic, broad and deep surveillance of online activity at a scale that could not have been previously imagined. Beyond simply snooping, the revelations pointed to infiltration of the hardware and software we rely on to secure our communications.
Symantec’s Melbourne Security Data Centre generates root keys for certificate authorities, a task that can’t be undertaken lightly given their vital role in online security. Here’s a photo tour of the rarely-seen and highly-secured centre, including the “Ceremony Room” used to generate the new keys.
An investigation by the Australian Privacy Commissioner explores how Telstra ended up placing details of 15,775 customers into a spreadsheet that was indexed by Google and available freely on its web site. That unfortunate experience provides plenty lessons for anyone involved with storing customer data — an especially important consideration with Australia’s privacy principles being strengthened this week.
Mobile phone tracking techniques are becoming more commonplace. Waste bins target ads. Shopping centres follow customers. Spooks follow airport passengers. Will the Privacy Act’s new definition of personal information provide enhanced protections against mobile phone tracking? Not really. Here’s why.
Hey Lifehacker, While I know it’s my employer’s right to put any software they wish on workplace computers, I’d like to know if my PC is being monitored. If I do online banking during my lunch break, I’m worried that my employer might have access to my credentials. Is there any method you could recommend to check if I’m being watched?