I was recently interviewed as a follow on from my article co-authored by Dr Nickolas Falkner on supply chain attacks. The segment was featured on breakfast radio for 101.5FM Radio Adelaide. You can listen to the segment below (hosted on Radio Adelaide and linked here)Read more "Radio Feature: Cyber Security"
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys. Shutterstock Richard Matthews, University of Adelaide and Nick Falkner, University of Adelaide If you run a business, you’re probably concerned about IT security. Maybe you invest in antivirus software, firewalls and regular […]Read more "How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it"
Advertisers may track a customer’s shopping preferences within a shopping centre by using ultrasonic beacons emitted from their mobile phones. Mai Lam/The Conversation NY-BD-CC, CC BY-SA Richard Matthews, University of Adelaide My lounge room is bugged. My phone is broadcasting an ultrasonic signal to my blu-ray player via an acoustic side channel beyond human hearing. The […]Read more "How silent signals from your phone could be recording and tracking you"
I was recently interviewed by Ariel Bogle working for the ABC on an article relating to my PhD Thesis on Photo Response Non-Uniformity noise. To understand how this fingerprint works, you must go inside the device, into the camera’s sensors. “The image sensor is broken up into little photosites,” explained Richard Matthews, a […]Read more "Quoted in ABC article – ‘Image ballistics’: Your smartphone camera reveals more than you think"
Students infiltrate a host computer under the watchful eye of a mentor during a capture the flag exercise. Richard Matthews, Author provided Richard Matthews, University of Adelaide What do nuclear submarines, top secret military bases and private businesses have in common? They are all vulnerable to a simple slice of cheddar. This was the clear […]Read more "Everyone falls for fake emails: lessons from cybersecurity summer school"
Apple inc. often boasts about its security capabilities. As announced at WWDC16, there has still been no malware seen at scale affecting iOS devices. This is vitally important when we consider the sheer volume of personal information stored on our mobile devices. But what gives Apple this secure advantage over other mobile platforms? Per their WWDC16 […]Read more "Apple's Million Dollar Security"