Bluetooth wireless communication makes it possible to track when people have been exposed to people infected with the coronavirus. The right cryptography scheme keeps alerts about exposures private.
Apps like Houseparty and Netflix Party are helping people stay in touch with friends - but do these apps have cyber dangers that we need to be aware of?
Zoom’s privacy and security shortcomings are just the latest videoconferencing vulnerabilities. Knowing each platform’s risks can help people avoid many of the downsides of virtual gatherings.
The coronavirus pandemic lays bare the many vulnerabilities created by society’s dependence on the internet. Watch the video to learn more about these issues.
‘Zoombombing’ trolls have started to infiltrate virtual meetings - bombarding unsuspecting victims with racist and sexist speech and in some cases, pornographic imagery.
Much of the world is moving online in response to the coronavirus pandemic. Society’s newly increased dependence on the internet is bringing the need for good cyber policy into sharp relief.
The MyGov website ground to a halt this week as thousands of people tried to access welfare support. As a result, long queues popped up at Centrelink offices across the country.
Laura DeNardis, American University School of Communication
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
The wool industry was paralysed for several days after hackers held to ransom the IT system that governs almost all wool sales in Australia and New Zealand. More attacks are a case of if, not when.
SpaceX and other companies are rushing to put thousands of small, inexpensive satellites in orbit, but pressure to keep costs low and a lack of regulation leave those satellites vulnerable to hackers.
You’re at the airport, or on the bus, and your phone’s low on juice so you plug into a nearby USB port. But you could be getting more than a power boost - some ports are booby-trapped with malware.
Around the world, elections are under attack. U.S. officials could learn from other countries about how to ensure everyone’s vote is recorded and counted accurately.
The Iranian military operates cyber espionage and sabotage through a network of dozens of contractors, allowing the state to attack foes while denying involvement.