News and Media

Internet 2.0 News & Media

Influence Bots: 2021 Myanmar Coup

Influence Bots: 2021 Myanmar Coup

The United States Army's Facebook page comment section was the target of a sophisticated 'Influence Botnet' attack from the 16th-17th of February 2021. In our latest report, we conduct an ... Read More

TikTok InApp Browser

TikTok InApp Browser

Further independent challenges claim TikTok can inject malicious script.  We took a close look and agree. Read More

It’s their word against their source code – New report on TikTok

It’s their word against their source code – New report on TikTok

In our latest report we reveal the excessive data collection of TikTok and that the app connects to mainland China based infrastructure. (We note that we put all of our research to TikTok for ... Read More

TikTok is not compatible with our approach to privacy

TikTok is not compatible with our approach to privacy

Our co-CEO, Robert Potter, recently spoke to the Australian Financial Review about TikTok's recent admission to Senator James Paterson that they can access Australian's user information from ... Read More

Shanghai Data Leak

Shanghai Data Leak

Our co-CEO, Robert Potter, has been busy providing his analysis to a range of media outlets on the recent leak of 1 billion personal records, mostly belonging to Chinese citizens, but also ... Read More

UK and US intelligence agencies sound alarm on Chinese industrial espionage

UK and US intelligence agencies sound alarm on Chinese industrial espionage

Our co-CEO, Robert Potter, was featured in Aljazeera News in relation alarms raised by the United Kingdom and the United States’ domestic intelligence services about Chinese economic espionage ... Read More

Technical Analysis of TikTok app

Technical Analysis of TikTok app

Following our recent WeChat Whitepaper and its associated feature in the Australian Financial Review, Penetrum, an Internet 2.0 company, has published a technical analysis of the TikTok mobile ... Read More

Consumers warned about sneaky WiFi tracing technique used by companies to track movements

Consumers warned about sneaky WiFi tracing technique used by companies to track movements

Internet 2.0's security engineer, Rafig Jabrayilov, recently provided advice to Brooke Rolfe from news.com.au on how to protect your privacy, given many shops are increasingly tracking the ... Read More

Concerns over China’s access to WeChat user data: report

Concerns over China’s access to WeChat user data: report

Max Mason from the Australian Financial Review has reported on our deep dive into the technical architecture of the WeChat platform and China's government propaganda procurement. The report ... Read More

Costa Rica is ‘at war’ with Russian hackers and other countries will be next, experts warn

Costa Rica is ‘at war’ with Russian hackers and other countries will be next, experts warn

Our co-CEO, Robert Potter recently worked with James Purtill and the ABC on this discussion of Conti and their recent attack on Costa Rica. Costa Rica has been dealing with a growing ... Read More

World’s ‘Most Active’ Ransomware Gangs Based in Russia Targeting Ukraine

World’s ‘Most Active’ Ransomware Gangs Based in Russia Targeting Ukraine

Earlier this month, Robert Potter spoke to 6PR Mornings about a recent increase in cyber attacks coming out of Russia. Listen to interview> Here Transcript excerpt: Liam Bartlett ... Read More

Internet 2.0 shortlisted for the Australian Space Awards 2022

Internet 2.0 shortlisted for the Australian Space Awards 2022

Internet 2.0 has been named as a finalist in the Australian Space Awards for SME Business of the Year and Start-up of the Year! The Australian Space Awards is the pinnacle event for ... Read More

What does Australia’s promise of cyber support for Ukraine mean?

What does Australia’s promise of cyber support for Ukraine mean?

ABC NewsRadio's Scott Wales spoke to Robert Potter, Co-CEO of Internet 2.0 about the Ukrainian and Australian foreign ministers recent discussion on opportunities to give Ukraine ... Read More

MEDIA RELEASE | Internet 2.0 partners with another Cloud giant to offer next generation firewall services

MEDIA RELEASE | Internet 2.0 partners with another Cloud giant to offer next generation firewall services

31st January 2022 Internet 2.0 has extended its ‘Cloaking Firewall’ technology offering to Azure, making it easier for you to inhibit cyber attackers from finding your network and hacking ... Read More

Beijing 2022 Winter Olympics

Beijing 2022 Winter Olympics

To mitigate the risk of sensitive information and personal data being collected on personal phones during the 2022 Beijing Winter Olympics, we recommend:   Athletes and visitors to ... Read More

Digital Surveillance in China

Digital Surveillance in China

Ahead of the 2022 Beijing Winter Olympics, Bloomberg News reports on Internet 2.0’s recent Whitepaper titled “Digital Surveillance in China” . The Whitepaper demonstrates the sophisticated and ... Read More

Robert Potter discusses Novak Djokovic’s PCR results with the SMH

Robert Potter discusses Novak Djokovic’s PCR results with the SMH

Robert Potter, Co-CEO of Internet 2.0, discussed Novak Djokovic's PCR results with the Sydney Morning Herald today. This is an interesting story which shows how cyber forensics can be applied to ... Read More

Help, I’ve Been Hacked!

Help, I’ve Been Hacked!

Steps To Stop Hackers Breaching Security by Emails and More Cybercrime is the fastest growing crime in the USA - it’s true. In 2021, digital incidents cost businesses of all sizes US$200,000 on ... Read More

Keeping Up With Cybersecurity Threats

Keeping Up With Cybersecurity Threats

Cybersecurity is as essential as locks on doors and soap in bathrooms. While the COVID-19 pandemic has seen a drop in many kinds of crime, cybercrime is an unfortunate exception. According to ... Read More

Questions Raised Over University Of Sydney Health Equipment Contract

Questions Raised Over University Of Sydney Health Equipment Contract

Sky News host Sharri Markson says questions have been raised over the University of Sydney’s decision not to declare it is on the cusp of awarding a multimillion-dollar contract to a Chinese ... Read More

Internet 2.0 Bolsters Malware Analysis And Defence With Acquisition Of Penetrum

Internet 2.0 Bolsters Malware Analysis And Defence With Acquisition Of Penetrum

Internet 2.0 has acquired Penetrum’s malware analysis sandbox ‘Malcore’, which will boost the speed and accuracy with which Internet 2.0 assesses cyber threats and defends against future ... Read More

The Difference Between A Secure Web Gateway And A Firewall

The Difference Between A Secure Web Gateway And A Firewall

The words “firewall” and “Secure Web Gateway” (SWG) not to be confused with an "Secure Internet Gateway" (SIG) have become higher in the general business consciousness over the past couple of ... Read More

Cybersecurity Perimeter Defense

Cybersecurity Perimeter Defense

The Enemy Outside The Perimeter Defences Perimeter defence in cybersecurity - is it even relevant anymore? If you want to keep something safe, throw up some barriers, right? Across history, the ... Read More

MEDIA RELEASE | Internet 2.0 now on AWS Marketplace

MEDIA RELEASE | Internet 2.0 now on AWS Marketplace

17th November 2021 Internet 2.0’s global first Cloaking Firewall now available on AWS Marketplace, offering more cost-effective cybersecurity Internet 2.0’s patented ‘Cloaking Firewall’ ... Read More

MEDIA RELEASE | Internet 2.0 and Astrolab Joint Venture

MEDIA RELEASE | Internet 2.0 and Astrolab Joint Venture

17th November 2021 Internet 2.0 and Astrolab to optimise internet reliability, security, and speed in Port Moresby Internet 2.0 has recently shipped a hardware system to Port Moresby, Papua ... Read More

The Essential Eight – Internet 2.0

The Essential Eight – Internet 2.0

Almost all government agencies have been mandated to utilise the Essential 8 security controls. This mandate does not extend to all enterprises in Australia however, so for many organisations, ... Read More

VPNs and Firewalls: The Differences And Why You Need Both

VPNs and Firewalls: The Differences And Why You Need Both

The difference between a VPN and a firewall is an important thing to know when you’re either partly or wholly responsible for securing the systems that keep a business running. Yes, both of ... Read More

Cybersecurity: Global Threats, Local Impacts

Cybersecurity: Global Threats, Local Impacts

Watch The Replay What are cyber hackers up to now? How exposed is your organisation to the activities of cyber hackers? What do you do with the ransomware claim that's frozen your system and ... Read More

Cybersecurity in Healthcare – The Big Issues

Cybersecurity in Healthcare – The Big Issues

Cybersecurity for healthcare providers: it’s an issue that just keeps getting more important. It’s simple; as the world in general continues to ‘go digital’, the responsibility on providers of ... Read More

Firewalls For Small Business

Firewalls For Small Business

Introduction In the digital era, cybersecurity is a significant issue. We've all heard about major corporate data breaches, but threat actors are increasingly targeting small companies. Whether ... Read More

Internet 2.0 Launches Public Awareness Campaign to Patch Vulnerable Systems

Internet 2.0 Launches Public Awareness Campaign to Patch Vulnerable Systems

While small businesses were the target of the attack on Microsoft’s email software earlier this year, months later, 75,000 systems are yet to have the vulnerability fixed. There are still around ... Read More

Spies for Hire

Spies for Hire

Spies for Hire: China’s New Breed of Hackers Blends Espionage and Entrepreneurship The state security ministry is recruiting from a vast pool of private-sector hackers who often have their own ... Read More

China: Facial Recognition

China: Facial Recognition

Working with Sharri Markson on Sky News Australia, Internet 2.0 revealed evidence of China's mass surveillance programs, this one being in Tongren City in central southern China, ... Read More

Zhenhua Data – Event

Zhenhua Data – Event

Internet 2.0 provided key technical and infrastructural support to the consortium that leaked the Overseas Key Information Database (OKIDB) compiled by Zhenhua Data inc. ​Working with a Media ... Read More

Zhenhua Data – Internet 2.0 Analysis
Shanghai CCP Members

Shanghai CCP Members

Released on 13 December 2020 Internet 2.0 provided key technical and infrastructural support to the consortium that leaked the Shanghai CCP Members list. ​Working with a media consortium and ... Read More