News & Trends
2018-12-07  

Title: Perth man handed suspended jail term over child porn material
 

Author:  Phil Hickey, Brisbane Times

 

Date: 30.11.2018

 

Abstract: A District Court judge has given a Perth man a suspended jail term after he ruled the images of young girls in swimsuits on his laptop that he was prosecuted over were "impossible" to be deemed child pornography.

 

Source: https://www.brisbanetimes.com.au/national/western-australia/perth-man-handed-suspended-jail-term-over-child-porn-material-20181129-p50j9d.html?ref=rss&utm_medium=rss&utm_source=rss_feed

2018-12-07  

Title: Elon Musk Predicted Artificial Intelligence Would Be 'Seriously Dangerous' by 2019. How Close Is That to Reality?

 

Author: Byron Reese, Entrepreneur

 

Date: 26.11.2018

 

Abstract: In 2014, Elon Musk posted, then quickly deleted, a comment on an article about artificial intelligence. The text of that comment has been saved and reads, in part, as follows: "The pace of progress in artificial intelligence (I'm not referring to narrow AI) is incredibly fast. ... The risk of something seriously dangerous happening is in the five-year timeframe. 10 years at most."

 

Source: https://www.entrepreneur.com/article/323278

2018-12-07  

Title: Adelaide joins national cyber battle with launch of Joint Cyber Security Centre
 

Author:  Stephen Kuper, Defense Connect

 

Date: 26.11.2018

 

Abstract: Australia’s cyber security apparatus and capabilities have been strengthened following the official opening of the Joint Cyber Security Centre (JCSC) in Adelaide on Friday. Defence Minister Christopher Pyne officially opened the JCSC and welcomed representatives from federal and state governments, the academic community and business, including critical defence and energy industries, in Adelaide on Friday.

 

Source: https://www.defenceconnect.com.au/intel-cyber/3213-adelaide-joins-national-cyber-battle-with-launch-of-joint-cyber-security-centre

2018-12-07  

Title: Mitigating Cyber Security Threats: Looking Back On Black Friday

 

Author: David Higgins, isBUZZnews

 

Date: 26.11.2018

 

Abstract: Just a few days have passed since Black Friday – the busiest discount shopping day of the year where retailers are competing to offer the best possible deals and bargains.

But this is also the time of year where savvy cyber criminals see an opportunity. Last year, the Carbon Black Threat Analysis Unit reported that organisations saw a 20.5 percent increase in attempted cyber attacks between November and December 2016. This seasonal period is a goldmine for the latest generation of hackers to steal customer credentials as well as being the cause of damage to a retailer’s reputation. So, how can retailers safeguard from cyber-attack for future Black Fridays?

 

Source: https://www.informationsecuritybuzz.com/articles/mitigating-cyber-security-threats/

more
VFAC Review
no image
2017-01-24
 
The VFAC Review is a bimonthly multi-disciplinary review of the issues and trends in cybercrime.

Issue 12 contains information on:

  • Conferences and Events
  • News & Trends
  • Recent Publications


Articles on:

  • A Geneva Convention or Declaration for Cyberspace
  • Cyber Conflict and Retribution: Uncertainties in the Dark


more
Book Review
no image
2018-09-07

Title: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
 

Authors: Maurice Dawson

 

Date: June 2018

 

Abstract: Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the world. This chapter discusses emerging laws, policies, processes, and tools that are changing the landscape of cyber security. This chapter provides an overview of the research to follow which will provide an in depth review of mobile security, mobile networks, insider threats, and various special topics in cyber security.

 

DOI: 10.4018/978-1-5225-5634-3.ch010

more