- The dangers of voice cloning and how to combat itby Leo S.F. Lin, Senior Lecturer in Policing Studies, Charles Sturt University on October 9, 2024 at 6:58 pm
In just seconds, scammers can clone a voice and use it to extort people. What can be done to safeguard against the threat?
- As an ethical hacker, I can’t believe the risks people routinely take when they access the internet in publicby Christopher Patrick Hawkins, Lecturer in Cyber Security and Computer Science, University of Staffordshire on October 8, 2024 at 4:25 pm
If you’re tempted to do a make a couple of cheeky payments while waiting for the band to come on, think again.
- Is your car a threat to national security? It can be – regardless of where it’s madeby Dennis B. Desmond, Lecturer, Cyberintelligence and Cybercrime Investigations, University of the Sunshine Coast on October 2, 2024 at 3:03 am
Modern cars made in most countries have remote control and online data features. What matters is who can access that data – and the vehicle itself.
- How to avoid being hacked: start by upping your password game – ‘12345’ doesn’t cut itby Thembekile Olivia Mayayise, Senior Lecturer, University of the Witwatersrand on June 16, 2024 at 10:41 am
The question has shifted from whether cyberattacks will occur to when and how they will happen.
- China turns to private hackers as it cracks down on online activists on Tiananmen Square anniversaryby Christopher K. Tong, Associate Professor of Asian Studies, University of Maryland, Baltimore County on May 31, 2024 at 1:02 pm
Beijing’s cyber operations are largely conducted in the shadows. But a recent leak has shed light on how the state is working with private companies to target online activism.
- MediSecure data breach: why is health data so lucrative for hackers?by Megan Prictor, Senior Lecturer in Law, The University of Melbourne on May 20, 2024 at 5:23 am
We don’t know much about the nature of this large-scale ransomware attack. But it’s not entirely surprising – health data is a prime target for cybercrime.
- What is credential stuffing and how can I protect myself? A cybersecurity researcher explainsby David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University on January 18, 2024 at 3:32 am
In what is colourfully termed a ‘brute force’ attack, hackers use bots to test millions of username and password combinations on different websites – until they find a match.
- What is LockBit, the cybercrime gang hacking some of the world’s largest organisations?by Jennifer Medbury, Lecturer in Intelligence and Security, Edith Cowan University on November 16, 2023 at 11:59 pm
Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
- Cyber-attacks against the UK Electoral Commission reveal an ongoing threat to democracyby Joe Burton, Professor of International Security (Security and Protection Science), Lancaster University on August 15, 2023 at 3:29 pm
Securing our voting systems to defend against hacks is vital but challenging.
- The $500 million ATO fraud highlights flaws in the myGov ID system. Here’s how to keep your data safeby Rob Nicholls, Associate professor of regulation and governance, UNSW Sydney on July 27, 2023 at 2:10 am
Scammers have exploited a simple weakness in the myGov online portal to redirect hundreds of millions of dollars in tax refunds.
- Four ways criminals could use AI to target more victimsby Daniel Prince, Professor of Cyber Security, Lancaster University on June 22, 2023 at 4:04 pm
AI could allow cybercriminals to operate with greater efficiency, targeting more people at once.
- Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrimeby Danny Steed, Lecturer in Cyber Security, Cranfield University on June 19, 2023 at 1:44 pm
Cybercriminals are attempting to monetise the hacking techniques used by state actors.
- Should governments ban TikTok? Can they? A cybersecurity expert explains the risks the app poses and the challenges to blocking itby Doug Jacobson, Professor of Electrical and Computer Engineering, Iowa State University on March 23, 2023 at 12:38 pm
What data privacy risk does TikTok pose, and what could the Chinese government do with data it collects? And is it even possible to ban an app?
- Dozens of US schools, universities move to ban TikTokby Nir Kshetri, Professor of Management, University of North Carolina – Greensboro on January 18, 2023 at 1:38 pm
School officials are becoming increasingly wary of TikTok amid concerns that the app poses a risk to student safety and privacy and makes the nation vulnerable to spies.
- How not to tell customers their data is at risk: the Optus approachby Edwina Luck, Senior Lecturer QUT Business School, Advertising, Marketing and Public Relations, Queensland University of Technology on September 23, 2022 at 7:27 am
Optus used press releases, and Twitter when it could have contacted its customers by text.
- ‘Liberate the tractors’: the right to repair movement that’s regaining control of our devicesby Michael Stead, Lecturer in Sustainable Design Futures, Lancaster University on August 22, 2022 at 4:00 pm
From tractors to smartphones, consumers may own their devices but the manufacturers still often hold the keys.
- Before paying a ransom, hacked companies should consider their ethics and valuesby Michael Parent, Professor, Management Information Systems, Simon Fraser University on August 17, 2022 at 6:08 pm
Cyberattacks demanding ransoms for the release of information are on the rise. To determine if they should pay, businesses need to think about how they would react in such a scenario.
- Hackathons should be renamed to avoid negative connotationsby P. Alison Paprica, Professor (adjunct) and Senior Fellow, Institute for Health Policy, Management and Evaluation, Dalla Lana School of Public Health, University of Toronto on July 18, 2022 at 1:56 pm
“Hackathons” can imply breaching security and privacy. To more accurately reflect their creative and constructive intent, they can be referred to instead as “datathons” or “code fests.”
- There are systems ‘guarding’ your data in cyberspace – but who is guarding the guards?by Joanne Hall, Senior Lecturer in Mathematics and Cybersecurity, RMIT University on May 27, 2022 at 5:24 am
Many organisations abide by a “zero trust” rule wherein absolute trust is placed in nothing, apart from a central identity and access management system. But what happens when this system is breached?
- We tracked election ad spending for 4,000 Facebook pages. Here’s what they’re posting about – and why cybersecurity is the bigger concernby Glenn Kefford, Senior Lecturer (Political Science), The University of Queensland on May 4, 2022 at 8:06 pm
The social media strategies of many parties and candidates aim to bypass mainstream media to speak directly to voters, but they are often not as sophisticated as is assumed.
- How the Russia-Ukraine conflict has put cryptocurrencies in the spotlightby Simon Dermarkar, Associate professor, HEC Montréal on April 6, 2022 at 1:31 pm
Cryptocurrency allows Ukraine to get quick financial support, and Russia, to bypass international sanctions and protect some of its economic interests.
- The hacker group Anonymous has waged a cyber war against Russia. How effective could they actually be?by Jennifer Medbury, Lecturer in Intelligence and Security, Edith Cowan University on March 1, 2022 at 3:07 am
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
- Wordle has been hacked – but that’s not going to ruin the funby John Dixon, Lecturer, Computer Science, University of Hull on January 26, 2022 at 3:13 pm
This deceptively simple online word guessing game has captured the English-speaking world.
- You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacksby Rick Wash, Associate Professor of Information Science and Cybersecurity, Michigan State University on November 1, 2021 at 12:26 pm
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
- What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets inby Bhanukiran Gurijala, Assistant Professor of Computer Science & Information Systems, West Virginia University on August 9, 2021 at 12:26 pm
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
Hacking The Conversation
China Spy Bases in Cuba
Watch Cyber Hackers in Action
AI is Reshaping Cybersecurity
Busting Phone Scammers
Facebook Hack Costs Thousands
Atrium Health Cyberattack
Security Education & Training
Fortinet Threat Research
Beware of Coronavirus Scams
Latest Hacking News
Money Appears in Bank Account
Fraud Fighters Cyber Scams