- AI is making smart devices – watches, speakers, doorbells – easier to hack. Here’s how to stay safeby Chao Chen, Deputy Director, Enterprise AI and Data Analytics Hub, RMIT Univeristy, RMIT University on April 17, 2024 at 5:38 am
With 17 billion internet-connected devices worldwide, AI is subtly creeping into our everyday lives – and making us more vulnerable to cyberattacks.
- What is Volt Typhoon? A cybersecurity expert explains the Chinese hackers targeting US critical infrastructureby Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County on March 29, 2024 at 12:46 pm
Chinese state-sponsored hackers are targeting critical infrastructure. Here’s what they’re doing, how the US government is responding and how you can help.
- Desperate for Taylor Swift tickets? Here are cybersecurity tips to stay safe from scamsby Cassandra Cross, Associate Dean (Learning & Teaching) Faculty of Creative Industries, Education and Social Justice, Queensland University of Technology on February 9, 2024 at 12:56 am
Australian fans who didn’t manage to snag Eras tickets are on the hunt – and scammers are capitalising on this. Here’s everything you need to know to protect yourself.
- Cybercrime victims who aren’t proficient in English are undercounted – and poorly protectedby Fawn Ngo, Associate Professor of Criminology, University of South Florida on January 29, 2024 at 1:35 pm
The federal government’s web portal for reporting cybercrimes is of little use if you have limited proficiency with English.
- What is credential stuffing and how can I protect myself? A cybersecurity researcher explainsby David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University on January 18, 2024 at 3:32 am
In what is colourfully termed a ‘brute force’ attack, hackers use bots to test millions of username and password combinations on different websites – until they find a match.
- An expert reviews the government’s 7-year plan to boost Australia’s cyber security. Here are the key takeawaysby David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University on November 22, 2023 at 3:42 am
Australia could become one of the world’s strongest cyber nations – but the success of the new strategy will come down to the details.
- What is LockBit, the cybercrime gang hacking some of the world’s largest organisations?by Jennifer Medbury, Lecturer in Intelligence and Security, Edith Cowan University on November 16, 2023 at 11:59 pm
Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
- Major cyberattack on Australian ports suggests sabotage by a ‘foreign state actor’by David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University on November 13, 2023 at 2:19 am
Port operator DP World handles roughly 40% of Australia’s sea freight. Over the weekend its ports were disrupted by what appears to be a malicious, targeted cyberattack.
- Governments and hackers agree: the laws of war must apply in cyberspaceby Johanna Weaver, Director, ANU Tech Policy Design Centre, Australian National University on October 25, 2023 at 4:20 am
Cyberspace is a battlefield in modern conflicts – and combatants must follow international humanitarian law to protect civilians.
- To steal today’s computerized cars, thieves go high-techby Doug Jacobson, Professor of Electrical and Computer Engineering, Iowa State University on August 14, 2023 at 12:24 pm
Thieves are trading their pry bars for laptops and wireless devices to steal cars that nowadays rely on remotes and computer networks.
- The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public mannerby Dennis B. Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast on May 26, 2023 at 5:04 am
The Five Eyes alliance is critical to hunting and detecting foreign cyber actors, but tends to work in secret.
- Lessons from ‘Star Trek: Picard’ – a cybersecurity expert explains how a sci-fi series illuminates today’s threatsby Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County on May 12, 2023 at 12:19 pm
‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.
- What is the National Cybersecurity Strategy? A cybersecurity expert explains what it is and what the Biden administration has changedby Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County on March 20, 2023 at 12:45 pm
The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.
- Darknet markets generate millions in revenue selling stolen personal data, supply chain study findsby Christian Jordan Howell, Assistant Professor in Cybercrime, University of South Florida on December 2, 2022 at 1:42 pm
The hacker who steals your data is just one part of an illicit supply chain featuring producers, wholesalers, distributors and consumers – a black-market industry worth millions of dollars.
- Did Twitter ignore basic security measures? A cybersecurity expert explains a whistleblower’s claimsby Richard Forno, Principal Lecturer in Computer Science and Electrical Engineering, University of Maryland, Baltimore County on September 1, 2022 at 12:24 pm
Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.
- Your digital footprints are more than a privacy risk – they could help hackers infiltrate computer networksby Ravi Sen, Associate Professor of Information and Operations Management, Texas A&M University on April 8, 2022 at 12:32 pm
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
- How Ukraine has defended itself against cyberattacks – lessons for the USby Robert Peacock, Assistant Professor of Criminology and Criminal Justice, Florida International University on April 5, 2022 at 12:49 pm
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
- Cyberattacks have yet to play a significant role in Russia’s battlefield operations in Ukraine – cyberwarfare experts explain the likely reasonsby Nadiya Kostyuk, Assistant Professor of Public Policy, Georgia Institute of Technology on April 4, 2022 at 12:31 pm
Cyberattacks can be devastating, just not on the battlefield, according to researchers who looked at 10 years of armed conflicts around the world.
- The hacker group Anonymous has waged a cyber war against Russia. How effective could they actually be?by Jennifer Medbury, Lecturer in Intelligence and Security, Edith Cowan University on March 1, 2022 at 3:07 am
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
- How AI is shaping the cybersecurity arms raceby Sagar Samtani, Assistant Professor of Operations and Decision Technologies, Indiana University on February 23, 2022 at 1:36 pm
Artificial intelligence is emerging as a key cybersecurity tool for both attackers and defenders.
- Russia could unleash disruptive cyberattacks against the US – but efforts to sow confusion and division are more likelyby Justin Pelletier, Professor of Practice of Computing Security, Rochester Institute of Technology on January 26, 2022 at 7:55 pm
Russia probably has the means to attack US electrical grids and otherwise create havoc but probably won’t go that far. Instead, watch for disinformation aimed at undermining the US and NATO.
- How the Biden administration is making gains in an uphill battle against Russian hackersby Scott Jasper, Senior Lecturer in National Security Affairs, Naval Postgraduate School on January 21, 2022 at 1:40 pm
The US has made a dent in Russian cyber criminal gangs. But tensions with Russia and the shadowy nature of hacking keep the threat level high.
- What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what’s at stakeby Santiago Torres-Arias, Assistant Professor of Electrical and Computer Engineering, Purdue University on December 22, 2021 at 1:12 pm
Log4Shell is the latest hacker exploit rocking the internet, and it’s arguably the worst yet. The vulnerability is in an obscure piece of software used on millions of computers.
- The best way to protect personal biomedical data from hackers could be to treat the problem like a gameby Zhiyu Wan, Postdoctoral Research Fellow in Biomedical Informatics, Vanderbilt University on December 16, 2021 at 1:27 pm
Keeping biomedical data private is important, but so is sharing it for research. Game theory can help researchers accomplish both.
- How vulnerable is your personal information? 4 essential readsby Eric Smalley, Science + Technology Editor on November 29, 2021 at 1:34 pm
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
Hackers
Cybersecurity, Privacy, Data Protection, Internet Law and Policy.
There are more than 2,000 satellites orbiting Earth right now. And there are about to be a lot more. But what does this mean?
The BBC was one of the companies affected by a cyber attack that targeted software called MOVEit used by Zellis, a payroll provider.
Jennifer Ewbank is the Deputy Director of CIA for Digital Innovation, responsible for accelerating the development and integration of digital and cyber.
Rapid development into new technologies and Artificial Intelligence is underway at an alarming rate the AI rise of the machines.
A Microsoft Overview of Russia’s Cyberattacks in Ukraine. Microsoft’s efforts to aid Ukraine’s response to Russia’s cyberattacks.
Finance company Latitude Financial says it will not give in to ransom demands by cyber criminals behind one of Australia's largest cyber-attacks.
With the rise of deepfakes and the increasing use of artificial intelligence AI in political campaigns, the face of politics is changing rapidly.
Dish Network has confirmed that their internal systems were the victim of a cyberattack and they got hacked with a ransomware attack.
The Corner Office How can you earn your Corner Office in the enterprise?
Hacking has become a common term in today's digital world, and it's hard to deny the impact it has had on our daily lives.
Information Security CRN RSS Feed.