Ransomware attacks are becoming increasingly complex, as hackers find creative ways to beat ordinary systems of defence.
A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
Unlike purpose-built data storage systems, a data lake can be used to dump data in its original form. This data usually remains unsupervised.
A major cyber attack on a data lake could have immense consequences for any of us. And the damage could be felt anywhere from banking to the healthcare sector.
It’s been reported that names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, passport details and student academic records were accessed.
The worst-case scenario is that hackers still have access to the university systems via a backdoor and are siphoning off critical data as it emerges.
Biometrics like retinal scans is a new frontier in the privacy wars.
States like California have been at the forefront of privacy innovation in recent decades. A possible federal law could bring their experimentation to a halt, harming consumers.
Society needs cybersecurity professionals who can protect systems and mitigate damage.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
Cybersecurity is an increasingly relevant concern in our society, but pop culture tells us virtually nothing useful about it.
IAFEI and partners Duke University and Grenoble EM regularly survey CFOs across the world. For the second quarter 2018, the poll ran from May 13 to June 7, 2018.
"If you think that hackers are just a bunch of anarchists ready to put everything on fire because it amuses them, you are wrong at all: we are much worse than that". (No One Is Innocent)
Numerous cyber attacks in recent years have targeted common household devices, such as routers.
A vigilant public is a necessary component in our collective security strategy against cyber attacks.
Hackers can interfere with everyday efforts to keep the lights on.
It's easier to see how customers benefit from increased grid security than it is to justify making them pay for it.
On the road again…
Digital nomadism and van life lie at the heart of today’s work aesthetics. These trends may create liminal experiences within job markets
We want your data.
gualtiero boffi / Shutterstock.com
The rate at which valuable identity information is flying out of the control of firms is alarming -- more than 3,500 records per minute.
Bad news on the doorstep. How to stay safe?
Like the recent WannaCry, viruses and other hacker software are now part of our digital lives. How big are the threats? How can we protect ourselves?
The public disclosures Uber has made so far make it very difficult to identify Australians caught up in the data breach.
Uber has admitted that the 2016 data breach puts at risk the personal information of 57 million users.
Some Peace Corps volunteers already provide computer assistance and instruction.
The US could help solve a global security problem and boost its image abroad by helping willing experts share their cybersecurity knowledge around the country and the globe.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they're doing it with bits and bytes. It's Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
Which hat would you wear?
The situation of Marcus Hutchins – hailed as a hero for stopping one malware attack but charged with being involved with another – highlights the ambiguity of hacker culture.