- As an ethical hacker, I can’t believe the risks people routinely take when they access the internet in publicby Christopher Patrick Hawkins, Lecturer in Cyber Security and Computer Science, University of Staffordshire on October 8, 2024 at 4:25 pm
If you’re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.
- Exploding pagers and walkie-talkies are a reminder of how easily your devices can be hacked – here’s how to make sure they are safeby Nick Hajli, AI Strategist and Professor of Digital Strategy, Loughborough University on September 24, 2024 at 4:04 pm
There are many ways of breaking into your devices. Make sure you safeguard against them.
- How cyberattacks on offshore wind farms could create huge problemsby Kimberly Tam, Associate Professor in Cyber Security, University of Plymouth on September 5, 2024 at 4:15 pm
AI could help close cybersecurity vulnerabilities at offshore wind farms.
- FraudGPT and other malicious AIs are the new frontier of online threats. What can we do?by Bayu Anggorojati, Assistant Professor, Cyber Security, Monash University on July 24, 2024 at 12:19 am
Widely available AI tools are supercharging cyber crime, which means we need to stay on top of our online security like never before.
- CrowdStrike crash showed us how invasive cyber security software is. Is there a better way?by Toby Murray, Associate Professor of Cybersecurity, School of Computing and Information Systems, The University of Melbourne on July 23, 2024 at 2:28 am
Software like Crowdstrike Falcon can access core computer systems and, essentially, spy on everything. We live with these tradeoffs – but perhaps we don’t have to.
- To guard against cyberattacks in space, researchers ask ‘what if?’by Patrick Lin, Professor of Philosophy, California Polytechnic State University on July 3, 2024 at 12:23 pm
Sabotaged space stations, falsified space probe data and faked alien contact are just a few of the scenarios a report on space cybersecurity outlines.
- We analysed the entire web and found a cybersecurity threat lurking in plain sightby Kevin Saric, Computer Scientist & Mechatronic Engineer, CSIRO on June 28, 2024 at 1:33 am
Think you can trust every website? One typo and you could be caught in a phishing trap.
- Chinese nationalist groups are launching cyber-attacks – often against the wishes of the governmentby Lewis Eves, Teaching Associate in Politics and International Relations, University of Sheffield on May 14, 2024 at 1:42 pm
The Chinese Communist Party has inadvertently given the country’s nationalist movement influence that it’s struggling to contain.
- Cybersecurity researchers spotlight a new ransomware threat – be careful where you upload filesby Selcuk Uluagac, Professor of Computing and Information Science, Florida International University on April 26, 2024 at 12:28 pm
Modern web browsers are increasingly becoming like virtual computers, able to send email and play music and videos. The downside is it’s a new way for hackers to get into your computer.
- AI is making smart devices – watches, speakers, doorbells – easier to hack. Here’s how to stay safeby Chao Chen, Deputy Director, Enterprise AI and Data Analytics Hub, RMIT Univeristy, RMIT University on April 17, 2024 at 5:38 am
With 17 billion internet-connected devices worldwide, AI is subtly creeping into our everyday lives – and making us more vulnerable to cyberattacks.
- What is Volt Typhoon? A cybersecurity expert explains the Chinese hackers targeting US critical infrastructureby Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County on March 29, 2024 at 12:46 pm
Chinese state-sponsored hackers are targeting critical infrastructure. Here’s what they’re doing, how the US government is responding and how you can help.
- Desperate for Taylor Swift tickets? Here are cybersecurity tips to stay safe from scamsby Cassandra Cross, Associate Dean (Learning & Teaching) Faculty of Creative Industries, Education and Social Justice, Queensland University of Technology on February 9, 2024 at 12:56 am
Australian fans who didn’t manage to snag Eras tickets are on the hunt – and scammers are capitalising on this. Here’s everything you need to know to protect yourself.
- Cybercrime victims who aren’t proficient in English are undercounted – and poorly protectedby Fawn Ngo, Associate Professor of Criminology, University of South Florida on January 29, 2024 at 1:35 pm
The federal government’s web portal for reporting cybercrimes is of little use if you have limited proficiency with English.
- What is credential stuffing and how can I protect myself? A cybersecurity researcher explainsby David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University on January 18, 2024 at 3:32 am
In what is colourfully termed a ‘brute force’ attack, hackers use bots to test millions of username and password combinations on different websites – until they find a match.
- An expert reviews the government’s 7-year plan to boost Australia’s cyber security. Here are the key takeawaysby David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University on November 22, 2023 at 3:42 am
Australia could become one of the world’s strongest cyber nations – but the success of the new strategy will come down to the details.
- What is LockBit, the cybercrime gang hacking some of the world’s largest organisations?by Jennifer Medbury, Lecturer in Intelligence and Security, Edith Cowan University on November 16, 2023 at 11:59 pm
Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
- Major cyberattack on Australian ports suggests sabotage by a ‘foreign state actor’by David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University on November 13, 2023 at 2:19 am
Port operator DP World handles roughly 40% of Australia’s sea freight. Over the weekend its ports were disrupted by what appears to be a malicious, targeted cyberattack.
- Governments and hackers agree: the laws of war must apply in cyberspaceby Johanna Weaver, Director, ANU Tech Policy Design Centre, Australian National University on October 25, 2023 at 4:20 am
Cyberspace is a battlefield in modern conflicts – and combatants must follow international humanitarian law to protect civilians.
- To steal today’s computerized cars, thieves go high-techby Doug Jacobson, Professor of Electrical and Computer Engineering, Iowa State University on August 14, 2023 at 12:24 pm
Thieves are trading their pry bars for laptops and wireless devices to steal cars that nowadays rely on remotes and computer networks.
- The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public mannerby Dennis B. Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast on May 26, 2023 at 5:04 am
The Five Eyes alliance is critical to hunting and detecting foreign cyber actors, but tends to work in secret.
- Lessons from ‘Star Trek: Picard’ – a cybersecurity expert explains how a sci-fi series illuminates today’s threatsby Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County on May 12, 2023 at 12:19 pm
‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.
- What is the National Cybersecurity Strategy? A cybersecurity expert explains what it is and what the Biden administration has changedby Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County on March 20, 2023 at 12:45 pm
The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.
- Darknet markets generate millions in revenue selling stolen personal data, supply chain study findsby Christian Jordan Howell, Assistant Professor in Cybercrime, University of South Florida on December 2, 2022 at 1:42 pm
The hacker who steals your data is just one part of an illicit supply chain featuring producers, wholesalers, distributors and consumers – a black-market industry worth millions of dollars.
- Did Twitter ignore basic security measures? A cybersecurity expert explains a whistleblower’s claimsby Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County on September 1, 2022 at 12:24 pm
Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.
- Your digital footprints are more than a privacy risk – they could help hackers infiltrate computer networksby Ravi Sen, Associate Professor of Information and Operations Management, Texas A&M University on April 8, 2022 at 12:32 pm
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.