The conflict between Israel and Hamas is happening online as well as on the ground.
Gwengoat/iStock / Getty Images Plus
The consequences of cyber conflict are primarily felt by civilians, who call for retaliation, fueling cycles of violence.
Fraud can happen to anyone.
Twinsterphoto/Shutterstock
Recent studies have shown fraud is an even bigger problem than people realise.
Phishers are crafty and their scams are always evolving.
weerapatkiatdumrong
Cybercriminals don’t take breaks, so you shouldn’t ever drop your guard.
Building a profile of someone can make it easier for criminals to gain access to their personal accounts.
Metamorworks / Shutterstock
AI could allow cybercriminals to operate with greater efficiency, targeting more people at once.
Loot stolen from the U.S. Postal Service is displayed on the dark web.
Via Evidence-Based Cybersecurity Research Group
Cyber bank fraud is on the rise. Here are some important ways to protect yourself.
AI may make spam more pervasive than ever.
AP Photo/Gene J. Puskar
Artificial intelligence is escalating the battle between spam senders and spam blockers. Recent advances could mean more convincing pitches to get you to click, buy and give up personal information.
Cloning someone’s voice is easier than ever.
D-Keine/iStock via Getty Images
Powerful AI tools available to anyone with an internet connection make it easy to impersonate someone’s voice, increasing the threat of phone scams.
If an email is setting off alarm bells, check the sender’s details.
Shutterstock
Email fraud is getting more personal.
Shutterstock
Scam techniques that rely on human nature are increasingly being executed via technology. Here are five that recorded big increases in 2021.
Your digital footprints can give hackers clues about you that they can use to trick you.
Ivan/Flickr
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
QR codes are visual patterns that store data smartphones can read.
AP Photo/Vincent Yu
Here’s what happens when you scan one of those ubiquitous two-dimensional black-and-white patterns, and why the FTC urges you to use caution.
Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off.
WhataWin/iStock via Getty Images
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
If your gut says something is off about an email message, stop and investigate.
Jose Luis Pelaez Inc/DigitalVision via Getty Images
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
Our critical infrastructures are growing increasingly complex as the number of devices and connections in these systems continues to grow.
(Shutterstock)
An increasing number of cyberattacks threaten critical infrastructures. These attacks exploit weaknesses in outdated and insecure systems.
ScamWatch
Australians are being bombarded with ‘missed parcel’ SMS messages that aren’t as they seem…
pathdoc/Shutterstock
Crude text scams, sent en masse, only have to work a handful of times to make criminals significant sums of cash.
Shutterstock
If you’re reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who ‘do the wrong thing’ is unlikely to help.
North Korea has a long history of hacking targets in the U.S.
Chris Price/Flickr
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
Shutterstock
There has been a dramatic spike in identity theft and online shopping scams this year as fraudsters try to take advantage of people’s vulnerability during uncertain times.
Shelter-in-place directives mean that more and more people are working remotely from home, producing more technological vulnerabilities.
(Mimi Thian/Unsplash)
With so many people working from home on vulnerable networks and set-ups, cybersecurity is a growing concern.