- What is credential stuffing and how can I protect myself? A cybersecurity researcher explainsby David Tuffley, Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University on January 18, 2024 at 3:32 am
In what is colourfully termed a ‘brute force’ attack, hackers use bots to test millions of username and password combinations on different websites – until they find a match.
- What is LockBit, the cybercrime gang hacking some of the world’s largest organisations?by Jennifer Medbury, Lecturer in Intelligence and Security, Edith Cowan University on November 16, 2023 at 11:59 pm
Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
- Cyber-attacks against the UK Electoral Commission reveal an ongoing threat to democracyby Joe Burton, Professor of International Security (Security and Protection Science), Lancaster University on August 15, 2023 at 3:29 pm
Securing our voting systems to defend against hacks is vital but challenging.
- The $500 million ATO fraud highlights flaws in the myGov ID system. Here’s how to keep your data safeby Rob Nicholls, Associate professor of regulation and governance, UNSW Sydney on July 27, 2023 at 2:10 am
Scammers have exploited a simple weakness in the myGov online portal to redirect hundreds of millions of dollars in tax refunds.
- Four ways criminals could use AI to target more victimsby Daniel Prince, Professor of Cyber Security, Lancaster University on June 22, 2023 at 4:04 pm
AI could allow cybercriminals to operate with greater efficiency, targeting more people at once.
- Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrimeby Danny Steed, Lecturer in Cyber Security, Cranfield University on June 19, 2023 at 1:44 pm
Cybercriminals are attempting to monetise the hacking techniques used by state actors.
- Should governments ban TikTok? Can they? A cybersecurity expert explains the risks the app poses and the challenges to blocking itby Doug Jacobson, Professor of Electrical and Computer Engineering, Iowa State University on March 23, 2023 at 12:38 pm
What data privacy risk does TikTok pose, and what could the Chinese government do with data it collects? And is it even possible to ban an app?
- Dozens of US schools, universities move to ban TikTokby Nir Kshetri, Professor of Management, University of North Carolina – Greensboro on January 18, 2023 at 1:38 pm
School officials are becoming increasingly wary of TikTok amid concerns that the app poses a risk to student safety and privacy and makes the nation vulnerable to spies.
- How not to tell customers their data is at risk: the Optus approachby Edwina Luck, Senior Lecturer QUT Business School, Advertising, Marketing and Public Relations, Queensland University of Technology on September 23, 2022 at 7:27 am
Optus used press releases, and Twitter when it could have contacted its customers by text.
- ‘Liberate the tractors’: the right to repair movement that’s regaining control of our devicesby Michael Stead, Lecturer in Sustainable Design Futures, Lancaster University on August 22, 2022 at 4:00 pm
From tractors to smartphones, consumers may own their devices but the manufacturers still often hold the keys.
- Before paying a ransom, hacked companies should consider their ethics and valuesby Michael Parent, Professor, Management Information Systems, Simon Fraser University on August 17, 2022 at 6:08 pm
Cyberattacks demanding ransoms for the release of information are on the rise. To determine if they should pay, businesses need to think about how they would react in such a scenario.
- Hackathons should be renamed to avoid negative connotationsby P. Alison Paprica, Professor (adjunct) and Senior Fellow, Institute for Health Policy, Management and Evaluation, Dalla Lana School of Public Health, University of Toronto on July 18, 2022 at 1:56 pm
“Hackathons” can imply breaching security and privacy. To more accurately reflect their creative and constructive intent, they can be referred to instead as “datathons” or “code fests.”
- There are systems ‘guarding’ your data in cyberspace – but who is guarding the guards?by Joanne Hall, Senior Lecturer in Mathematics and Cybersecurity, RMIT University on May 27, 2022 at 5:24 am
Many organisations abide by a “zero trust” rule wherein absolute trust is placed in nothing, apart from a central identity and access management system. But what happens when this system is breached?
- We tracked election ad spending for 4,000 Facebook pages. Here’s what they’re posting about – and why cybersecurity is the bigger concernby Glenn Kefford, Senior Lecturer (Political Science), The University of Queensland on May 4, 2022 at 8:06 pm
The social media strategies of many parties and candidates aim to bypass mainstream media to speak directly to voters, but they are often not as sophisticated as is assumed.
- How the Russia-Ukraine conflict has put cryptocurrencies in the spotlightby Simon Dermarkar, Associate professor, HEC Montréal on April 6, 2022 at 1:31 pm
Cryptocurrency allows Ukraine to get quick financial support, and Russia, to bypass international sanctions and protect some of its economic interests.
- The hacker group Anonymous has waged a cyber war against Russia. How effective could they actually be?by Jennifer Medbury, Lecturer in Intelligence and Security, Edith Cowan University on March 1, 2022 at 3:07 am
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.
- Wordle has been hacked – but that’s not going to ruin the funby John Dixon, Lecturer, Computer Science, University of Hull on January 26, 2022 at 3:13 pm
This deceptively simple online word guessing game has captured the English-speaking world.
- You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacksby Rick Wash, Associate Professor of Information Science and Cybersecurity, Michigan State University on November 1, 2021 at 12:26 pm
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
- What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets inby Bhanukiran Gurijala, Assistant Professor of Computer Science & Information Systems, West Virginia University on August 9, 2021 at 12:26 pm
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
- How does the Pegasus spyware work, and is my phone at risk?by Paul Haskell-Dowland, Associate Dean (Computing and Security), Edith Cowan University on July 20, 2021 at 8:10 pm
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.
- Improving cybersecurity means understanding how cyberattacks affect both governments and civiliansby Debora Irene Christine, Researcher, United Nations University Insitute in Macau (UNU-CS), United Nations University on July 19, 2021 at 2:33 pm
A UN working group on cybersecurity is making incremental progress in highlighting the importance of including and protecting civilians.
- It’s far too easy for abusers to exploit smart toys and trackersby Saheli Datta Burton, Research Fellow, Department of Science Technology Engineering and Public Policy, UCL on June 4, 2021 at 2:31 pm
We believe fitness trackers keep us healthy, and connected toys keep children safe – but such devices are easily abused.
- A Chinese hacking competition may have given Beijing new ways to spy on the Uyghursby Chaminda Hewage, Reader in Data Security, Cardiff Metropolitan University on May 21, 2021 at 3:44 pm
In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China’s Uyghur minority.
- The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problemby Terry Thompson, Adjunct Instructor in Cybersecurity, Johns Hopkins University on May 10, 2021 at 6:20 pm
Fragmented authority for national cyber defense and the vulnerabilities of private companies that control software and infrastructure stack the deck against US cybersecurity.
- Four ways to make sure your passwords are safe and easy to rememberby Steven Furnell, Professor of Cyber Security, University of Nottingham on May 5, 2021 at 10:55 am
Passwords have been around for decades and we’re still getting it wrong.
Hacking The Conversation
Videos on TechRepublic News, Tips, and Advice for Technology Professionals.
Peace of mind from security’s ethical hackers greatest minds. Increase your resistance to attack by tapping the world’s top ethical hackers. Understand your att...
HackRead Latest Cyber Crime - InfoSec- Tech - Hacking News
Indigo Sky Casino, located in Wyandotte, Oklahoma, has recently announced that they have been impacted by a data breach.
Artificial intelligence (AI) is transforming industries and society, and a global race has taken off for who will create the most cutting-edge technology.
Ukrainian forces are battling Russian troops on the ground but a different hackers war is being waged online by the Anonymous hackers collective.
Physical Information and products for enterprise physical security executives.
Here is a list of the most dangerous Advanced Persistent Threat APT groups in the world.
Two big healthcare systems in Connecticut started doing damage control after a cyberattack now involving the FBI.
Data Breach News Trending Cybersecurity News.
Victims impacted by the data breach may include higher education students in Colorado between 2007-2020 and high school students between 2004-2020 and more.
Indigo has confirmed that it will not be paying the hackers who stole company data.