Few countries have laws that require their cyber agencies that monitor hacking to report the criminal acts – either to third party victims or to the police.
According to the OAIC an ‘eligible data breach’, which triggers notification obligations, is a data breach that is likely to result in serious harm to any of the individuals to whom the information relates.
Armourcell is a peel-and-stick square that can be slapped onto the back of mobile phones to protect a user’s mobile phone from wireless breaches.
The Victorian Government has established the Victoria Cyber Security Strategy, which outlines how the government will move against cyber threats.
The latest project that Austen Heinz and Gilad Gome are working on together has everyone within the Silicon Valley tech scene talking – the pair presented at Demo Conference recently and talked about a new pro-biotic supplement called ‘Sweet Peach’ that they wanted to bring to the market to enable women to change the way their vaginas smell.
We spoke about a number of things including where the business is heading, the importance of IT education and looked at the future of hacking, and how the education of the next generation on good hacking vs bad hacking is an important issue that Bugcrowd has become actively involved with in the United States.
There are numerous activities that an organisation or corporation can engage in to push aside traditional thinking, and try to ingrain a culture of continuous innovation. Hackathons are a popular choice at the moment, and contrary to popular belief, they don’t just have to be about technology.
As technology advances, so too does crime. And the tools used to commit crimes are advancing as rapidly as digital devices are. But one thing hasn’t changed – a criminal’s acumen and dexterity when it comes to the act of the crime. Today, cybercrime and data breaches costs the Australian economy over $1 billion and the global economy around $120 billion annually.