Articles on Hacking

Displaying 1 - 20 of 183 articles

If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs. Shutterstock

Cybersecurity: high costs for companies

The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures...
True love could be hiding inside mounds of data. xtock/Shutterstock.com

Can you life-hack your way to love?

Trying to optimize the search for love can be naive. Using statistics and measurements isn't necessarily the best way to find a human partner.
They’re small and well-connected, but how safe are ‘internet of things’ devices? BeeBright/Shutterstock.com

The quiet threat inside ‘internet of things’ devices

As the number of 'internet of things' devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers. Scott Olson/AFP

Marriott data breach: 500 million times concerned

The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
Do people need insurance against hacking? ra2studio/Shutterstock.com

As digital threats grow, will cyber insurance take off?

As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
The Australian National University has been working with intelligence agencies to minimise the impact of a cyber attack on its systems. Mark爱生活/Flickr

How Australian universities can get better at cyber security

Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys. Shutterstock

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it

Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.

Top contributors

More