• Advertise
  • About us
  • Terms and Conditions
  • Contact us
Tuesday, March 24, 2026
Australian Times News
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia
No Result
View All Result
Australian Times News
No Result
View All Result
Home News

Security flaws in Microsoft email software raise questions over Australia’s cybersecurity approach

On March 2, 2021, Microsoft published information about four critical vulnerabilities in its widely used Exchange email server software that are being actively exploited. It also released security updates for all versions of Exchange back to 2010.

The Conversation by The Conversation
14-03-2021 22:17
in News
Photo by Matthew Manuel on Unsplash

Photo by Matthew Manuel on Unsplash

Carsten Rudolph, Monash University

On March 2, 2021, Microsoft published information about four critical vulnerabilities in its widely used Exchange email server software that are being actively exploited. It also released security updates for all versions of Exchange back to 2010.

Microsoft has told cybersecurity expert Brian Krebs it was notified of the vulnerabilities in “early January”. The Australian Cyber Security Centre has also issued a notice on the vulnerabilities.

The situation has been widely reported in the general media as well as specialist cybersecurity sites, but often inaccurately. But the situation also highlights a contradiction in government cybersecurity policy.

When governments find flaws in widely used software, they may not publish the details in order to build up their own offensive cybersecurity capabilities, i.e. the ability to target computers and networks for spying, manipulation and disruption. Operations like this often rely on exploiting vulnerabilities in commercial software — thus leaving their own citizens vulnerable to attack as a consequence.

What happened?

Microsoft has issued patches to fix the vulnerabilities and provided advice on how to respond if systems have already been affected.

These vulnerabilities can be really damaging for anybody running their own Exchange mail server. Attackers can run any code on the server and fully compromise a business’s email, allowing them to impersonate anybody in the business. They could also read all email stored on the server and potentially compromise more systems within the businesses’ network.

AlsoRead...

Design Without Compromise: Where Gutter Protection Meets Modern Architecture

Design Without Compromise: Where Gutter Protection Meets Modern Architecture

20 March 2026
The Rise of This Lead Generation Workshop Across Australia

The Rise of This Lead Generation Workshop Across Australia

13 February 2026

Who was affected?

It’s important to clear up exactly who the vulnerabilities affected: anybody running their own instance of Exchange, and the risk was higher if web access was turned on.

An ABC/Reuters report said:

All of those affected appear to run Web versions of email client Outlook and host them on their own machines, instead of relying on cloud providers.

But using a cloud-hosted version of Exchange wouldn’t necessarily solve the problem, as the vulnerabilities still exist. What’s more, larger enterprises will most probably still choose or be required by regulation to also run a local Exchange server that can be exploited in the same way.


Another open issue with moving mail servers to the cloud is that it also gives the provider access to all unencrypted emails by default. End-to-end encryption would increase security, but this is not currently standard practice.

Questions for Microsoft

As vulnerabilities existed in versions of the software released as long ago as 2010, we can assume more skilled attackers have already used them. This raises a fundamental question about the quality of the software, which Microsoft has been developing since 1996. Why did Microsoft not spot these vulnerabilities earlier?

Another question: if Microsoft knew about the vulnerabilities in early January, why did it take two months to alert its customers?

Questions for cybersecurity policy

We also need to consider the bigger picture of how we deal with vulnerabilities in software that builds the backbone of our computer and network infrastructure. Obviously, these vulnerabilities would have been a great offensive cybersecurity tool for any number of actors.

There is a basic conflict between building offensive cybersecurity capabilities and protecting our own businesses and citizens.

Imagine you are tasked with building offensive cybersecurity capabilities. You discover these vulnerabilities in Microsoft Exchange. Would you alert the vendor, Microsoft in this case, to make sure they are fixed as soon as possible, or would you keep them secret to not to lose your great new cyber weapon? Secretly having access to an organisation’s email could be very valuable for law enforcement or intelligence agencies.


Australia’s Cyber Security Strategy 2020 does not address the contradiction between establishing offensive cybersecurity capabilities and protecting Australians from cybersecurity vulnerabilities.

The establishment of offensive cybersecurity capabilities is explicitly mentioned in the strategy. In contrast, the detection of vulnerabilities with the goal of mitigation is not a clear goal.

Nor is openness about existing vulnerabilities — which would empower Australian citizens to react to them — part of the strategy. Australia has the expertise across the public sector, private sector and civil society to have this important dialogue on how to best protect Australian citizens and businesses.

Carsten Rudolph, Associate professor, Monash University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

Tags: SB001
DMCA.com Protection Status

SUBSCRIBE to our NEWSLETTER

[mc4wp_form id=”2384248″]

Don't Miss

Design Without Compromise: Where Gutter Protection Meets Modern Architecture

by Fazila Olla-Logday
20 March 2026
Design Without Compromise: Where Gutter Protection Meets Modern Architecture
Business & Finance

Design without compromise by integrating gutter protection seamlessly into modern architecture. Discover how innovative gutter systems enhance your home’s aesthetics...

Read moreDetails

How WageSafe Secured Australia’s Most Reputable Retail Business Among Its Premium Clients

by Fazila Olla-Logday
12 March 2026
How WageSafe Secured Australia’s Most Reputable Retail Business Among Its Premium Clients
at

Learn how WageSafe helps businesses stay compliant with payroll and wage regulations through reliable monitoring, risk management, and expert support—protecting...

Read moreDetails

Zakeke AI Agent Studio Removes the E-Commerce Content Bottleneck With Outputs in Seconds

by Fazila Olla-Logday
3 March 2026
Zakeke AI Agent Studio Removes the E-Commerce Content Bottleneck With Outputs in Seconds
at

Zakeke AI Agent Studio removes the e-commerce content bottleneck by generating product content and visuals in seconds, enabling brands to...

Read moreDetails

Empire Traveller launches to give Small and Medium Businesses Enterprise-Level Travel rates

by Pauline Torongo
20 February 2026
Empire Traveller launches to give Small and Medium Businesses Enterprise-Level Travel rates
Travel

Empire Traveller suggests the travel sector may be entering a more inclusive phase — one where advantage is shaped less...

Read moreDetails

Is Feng Shui Master Xu Really A Modern Genius?

by Fazila Olla-Logday
19 February 2026
Is Feng Shui Master Xu Really A Modern Genius?
at

Is Feng Shui Master Xu truly a modern genius, or simply a master of timeless wisdom? Blending ancient Feng Shui...

Read moreDetails

The Rise of This Lead Generation Workshop Across Australia

by Pauline Torongo
13 February 2026
The Rise of This Lead Generation Workshop Across Australia
Business & Finance

“Where U?”, is a two-day in-person lead generation workshop that teaches Australian business owners how to build their own acquisition...

Read moreDetails

Lyca Mobile Australia’s Customer-First Overhaul Pays Off with Finder Award Win

by Fazila Olla-Logday
2 February 2026
Lyca Mobile Australia's Customer-First Overhaul Pays Off with Finder Award Win
Technology

Lyca Mobile Australia’s customer-first overhaul has earned a Finder Award, recognising its improved value, service, and stronger focus on Australian...

Read moreDetails
Load More

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status

  • About us
  • Write for Us
  • Advertise
  • Contact us
  • T&Cs, Privacy and GDPR
No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status

No Result
View All Result
  • News
    • Weather
    • Sport
    • Technology
    • Business & Finance
      • Currency Zone
    • Lotto Results
      • The Lott
  • Lifestyle
    • Entertainment
    • Horoscopes
    • Health & Wellness
    • Recipes
  • Travel
  • Expat Life
  • Move to Australia

Copyright © Blue Sky Publications Ltd. All Rights Reserved.
australiantimes.co.uk is a division of Blue Sky Publications Ltd. Reproduction without permission prohibited. DMCA.com Protection Status