Students infiltrate a host computer under the watchful eye of a mentor during a capture the flag exercise. Richard Matthews, Author provided Richard Matthews, University of Adelaide What do nuclear submarines, top secret military bases and private businesses have in common? They are all vulnerable to a simple slice of cheddar. This was the clear […]Read more "Everyone falls for fake emails: lessons from cybersecurity summer school"
Apple inc. often boasts about its security capabilities. As announced at WWDC16, there has still been no malware seen at scale affecting iOS devices. This is vitally important when we consider the sheer volume of personal information stored on our mobile devices. But what gives Apple this secure advantage over other mobile platforms? Per their WWDC16 […]Read more "Apple's Million Dollar Security"