
News and Media
Internet 2.0 News & Media
Why your personal TikTok data is so valuable to Chinese spies – 60 Minutes
With Malcore now anyone can conduct code analysis on mobile apps. Internet 2.0 used Malcore to find TikTok Super location as reported in the Australian Financial Review and 60 Minutes ... Read More
At Risk Research Report Release
Internet 2.0 has conducted research into Researchers and IP at Risk of the PRC’s Technology Transfer Program. "To understand the People's Republic of China's talent and intellectual property ... Read More
Designed to Collect Data: TikTok Scores 63.1% – highest Malcore score of industry
The Malcore team at Internet 2.0 have been releasing an industry analysis of social media mobile applications. We have been doing this daily through blog posts. This post marks the release of ... Read More
The Applied AI Company (AAICO) and Internet 2.0 strike US$60 million AI-powered cybersecurity partnership
Cybersecurity threats and the proliferation of inauthentic content and traffic pose an increasing challenge to sustaining a free and open internet. Under this partnership Internet 2.0 will ... Read More
TikTok Propaganda
"The Chinese Communist Party is paying online influencers and production companies as much as $620,000 to create propaganda and counter global efforts to expose human rights abuses against the ... Read More
Internet 2.0 Releases Malcore
Several years in the making, Internet 2.0 releases its new capability Malcore. Malcore is powered by AI and is designed to automate advanced malware analysis tasks. Founded by the top malware ... Read More
Influence Bots: 2021 Myanmar Coup
The United States Army's Facebook page comment section was the target of a sophisticated 'Influence Botnet' attack from the 16th-17th of February 2021. In our latest report, we conduct an ... Read More
TikTok InApp Browser
Further independent challenges claim TikTok can inject malicious script. We took a close look and agree. Read More
It’s their word against their source code – New report on TikTok
In our latest report we reveal the excessive data collection of TikTok and that the app connects to mainland China based infrastructure. (We note that we put all of our research to TikTok for ... Read More
TikTok is not compatible with our approach to privacy
Our co-CEO, Robert Potter, recently spoke to the Australian Financial Review about TikTok's recent admission to Senator James Paterson that they can access Australian's user information from ... Read More
Shanghai Data Leak
Our co-CEO, Robert Potter, has been busy providing his analysis to a range of media outlets on the recent leak of 1 billion personal records, mostly belonging to Chinese citizens, but also ... Read More
UK and US intelligence agencies sound alarm on Chinese industrial espionage
Our co-CEO, Robert Potter, was featured in Aljazeera News in relation alarms raised by the United Kingdom and the United States’ domestic intelligence services about Chinese economic espionage ... Read More
Technical Analysis of TikTok app
Following our recent WeChat Whitepaper and its associated feature in the Australian Financial Review, Penetrum, an Internet 2.0 company, has published a technical analysis of the TikTok mobile ... Read More
Consumers warned about sneaky WiFi tracing technique used by companies to track movements
Internet 2.0's security engineer, Rafig Jabrayilov, recently provided advice to Brooke Rolfe from news.com.au on how to protect your privacy, given many shops are increasingly tracking the ... Read More
Concerns over China’s access to WeChat user data: report
Max Mason from the Australian Financial Review has reported on our deep dive into the technical architecture of the WeChat platform and China's government propaganda procurement. The report ... Read More
Costa Rica is ‘at war’ with Russian hackers and other countries will be next, experts warn
Our co-CEO, Robert Potter recently worked with James Purtill and the ABC on this discussion of Conti and their recent attack on Costa Rica. Costa Rica has been dealing with a growing ... Read More
World’s ‘Most Active’ Ransomware Gangs Based in Russia Targeting Ukraine
Earlier this month, Robert Potter spoke to 6PR Mornings about a recent increase in cyber attacks coming out of Russia. Listen to interview> Here Transcript excerpt: Liam Bartlett ... Read More
Internet 2.0 shortlisted for the Australian Space Awards 2022
Internet 2.0 has been named as a finalist in the Australian Space Awards for SME Business of the Year and Start-up of the Year! The Australian Space Awards is the pinnacle event for ... Read More
What does Australia’s promise of cyber support for Ukraine mean?
ABC NewsRadio's Scott Wales spoke to Robert Potter, Co-CEO of Internet 2.0 about the Ukrainian and Australian foreign ministers recent discussion on opportunities to give Ukraine ... Read More
MEDIA RELEASE | Internet 2.0 partners with another Cloud giant to offer next generation firewall services
31st January 2022 Internet 2.0 has extended its ‘Cloaking Firewall’ technology offering to Azure, making it easier for you to inhibit cyber attackers from finding your network and hacking ... Read More
Beijing 2022 Winter Olympics
To mitigate the risk of sensitive information and personal data being collected on personal phones during the 2022 Beijing Winter Olympics, we recommend: Athletes and visitors to ... Read More
Digital Surveillance in China
Ahead of the 2022 Beijing Winter Olympics, Bloomberg News reports on Internet 2.0’s recent Whitepaper titled “Digital Surveillance in China” . The Whitepaper demonstrates the sophisticated and ... Read More
Robert Potter discusses Novak Djokovic’s PCR results with the SMH
Robert Potter, Co-CEO of Internet 2.0, discussed Novak Djokovic's PCR results with the Sydney Morning Herald today. This is an interesting story which shows how cyber forensics can be applied to ... Read More
Help, I’ve Been Hacked!
Steps To Stop Hackers Breaching Security by Emails and More Cybercrime is the fastest growing crime in the USA - it’s true. In 2021, digital incidents cost businesses of all sizes US$200,000 on ... Read More
Keeping Up With Cybersecurity Threats
Cybersecurity is as essential as locks on doors and soap in bathrooms. While the COVID-19 pandemic has seen a drop in many kinds of crime, cybercrime is an unfortunate exception. According to ... Read More
Questions Raised Over University Of Sydney Health Equipment Contract
Sky News host Sharri Markson says questions have been raised over the University of Sydney’s decision not to declare it is on the cusp of awarding a multimillion-dollar contract to a Chinese ... Read More
Internet 2.0 Bolsters Malware Analysis And Defence With Acquisition Of Penetrum
Internet 2.0 has acquired Penetrum’s malware analysis sandbox ‘Malcore’, which will boost the speed and accuracy with which Internet 2.0 assesses cyber threats and defends against future ... Read More
The Difference Between A Secure Web Gateway And A Firewall
The words “firewall” and “Secure Web Gateway” (SWG) not to be confused with an "Secure Internet Gateway" (SIG) have become higher in the general business consciousness over the past couple of ... Read More
Cybersecurity Perimeter Defense
The Enemy Outside The Perimeter Defences Perimeter defence in cybersecurity - is it even relevant anymore? If you want to keep something safe, throw up some barriers, right? Across history, the ... Read More
MEDIA RELEASE | Internet 2.0 now on AWS Marketplace
17th November 2021 Internet 2.0’s global first Cloaking Firewall now available on AWS Marketplace, offering more cost-effective cybersecurity Internet 2.0’s patented ‘Cloaking Firewall’ ... Read More
MEDIA RELEASE | Internet 2.0 and Astrolab Joint Venture
17th November 2021 Internet 2.0 and Astrolab to optimise internet reliability, security, and speed in Port Moresby Internet 2.0 has recently shipped a hardware system to Port Moresby, Papua ... Read More
The Essential Eight – Internet 2.0
Almost all government agencies have been mandated to utilise the Essential 8 security controls. This mandate does not extend to all enterprises in Australia however, so for many organisations, ... Read More
VPNs and Firewalls: The Differences And Why You Need Both
The difference between a VPN and a firewall is an important thing to know when you’re either partly or wholly responsible for securing the systems that keep a business running. Yes, both of ... Read More
Cybersecurity: Global Threats, Local Impacts
Watch The Replay What are cyber hackers up to now? How exposed is your organisation to the activities of cyber hackers? What do you do with the ransomware claim that's frozen your system and ... Read More
Cybersecurity in Healthcare – The Big Issues
Cybersecurity for healthcare providers: it’s an issue that just keeps getting more important. It’s simple; as the world in general continues to ‘go digital’, the responsibility on providers of ... Read More
Firewalls For Small Business
Introduction In the digital era, cybersecurity is a significant issue. We've all heard about major corporate data breaches, but threat actors are increasingly targeting small companies. Whether ... Read More
Internet 2.0 Launches Public Awareness Campaign to Patch Vulnerable Systems
While small businesses were the target of the attack on Microsoft’s email software earlier this year, months later, 75,000 systems are yet to have the vulnerability fixed. There are still around ... Read More
Spies for Hire
Spies for Hire: China’s New Breed of Hackers Blends Espionage and Entrepreneurship The state security ministry is recruiting from a vast pool of private-sector hackers who often have their own ... Read More
China: Facial Recognition
Working with Sharri Markson on Sky News Australia, Internet 2.0 revealed evidence of China's mass surveillance programs, this one being in Tongren City in central southern China, ... Read More
Zhenhua Data – Event
Internet 2.0 provided key technical and infrastructural support to the consortium that leaked the Overseas Key Information Database (OKIDB) compiled by Zhenhua Data inc. Working with a Media ... Read More
Shanghai CCP Members
Released on 13 December 2020 Internet 2.0 provided key technical and infrastructural support to the consortium that leaked the Shanghai CCP Members list. Working with a media consortium and ... Read More