Cyber for society
Magda data catalog
With Magda, data analysts, scientists and engineers can easily find useful data with powerful discovery features and make data-informed decisions with confidence.
Enhancing Speech Emotion Recognition using Machine Learning Techniques
Recognising human emotion in technology has always been fascinating work for data scientists. CSIRO’s Data61 is advancing the science of Speech Emotion Recognition (SER).
Creating safe and secure systems
This common action is putting you at risk of being deepfaked
What is a deepfake? Deepfaking is the act of using artificial intelligence and machine learning technology to produce or alter video, image or audio content using the sequence of the original to create a version of something that didn’t occur.
How you can a-Void a voice spoofing attack
Siri, Alexa, Bixby and Google Home all allow people to use voice commands to quickly shop online, make phone calls, send messages, control smart home appliances, and access banking services. Because of these personal and security–critical commands, voice assistants are lucrative targets for attackers to exploit.
Why we are vaccinating algorithms against adversarial attacks
As the use of artificial intelligence (AI) and machine learning across our society and economy is increasing, so too is the threat of these technologies being manipulated by bad actors. Our researchers have developed a world-first set of techniques, similar to the vaccination process, to inoculate machine learning models against such attacks.
Protecting and preserving privacy
PhishZip: A new compression-based algorithm for detecting phishing websites
Phishing has grown significantly since 2010 and is currently experiencing a huge surge during the COVID-19 pandemic. The dynamics of phishing attacks makes it highly challenging to implement a robust phishing detection system. However, a novel method is changing that.
What is data privacy and why it's so important
Over the last few years, data privacy and its lifecycle has become an increasing concern of consumers and businesses alike, with both adopting and trying to keep up with the rapidly changing digital environment
Web of worries
In a mere 20 years, the Internet has evolved from a fledgling ‘network of networks’ developed by Tim Berners-Lee to the all-encompassing behemoth that it is today. But the World Wide Web is a tangled mass of interconnected services, and our researchers have spotlighted a fundamental flaw in its design that has significant implications on privacy and security.
Understanding and navigating risk
Decade of cybersecurity report could help reduce the future of cyber crime
Known as ‘FinalBlacklist’, the paper collates 51.6 million mal-activity reports dating back to 2007, aggregating 662,000 unique IP addresses worldwide, which were categorised using machine learning techniques into six classes of mal-activity: Malware, Phishing, Fraudulent Services, Potentially Unwanted Programs, Exploits and Spamming.
Eight tips on staying cyber safe during COVID-19
As the majority of us continue to work from home and we use our phone or computer to stay in touch with family, friends and colleagues, ensuring your cyber safety is not only crucial but possible with these eight tips.