Artikel-artikel mengenai Phishing

Menampilkan semua artikel

Shutterstock/AAP/The Conversartion

‘I think we should be very concerned’: A cyber crime expert on this week’s hack and what needs to happen next

‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next. The Conversation38,8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Do you want to be friends with this person? Sasun Bughdaryan

Why do so many people fall for fake profiles online?

Almost every online deception, fraud and scam – even propaganda and misinformation campaigns – begins with a fake social media profile. How do fakers get real people to agree to be friends?
For safety, look to text-only messaging. The Conversation, via picascii.com, publicdomainpictures.net and kelvinsong

The only safe email is text-only email

It's impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It's time to return to plain, text-only email.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most. Shutterstock

Is cyberspace the latest conflict frontier on the African continent?

Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
Gah! What did I just do?!?! Image of hands and computer via shutterstock.com

Cybersecurity’s weakest link: humans

We are deepening our understanding of why people fall victim to the attacks in the first place.
If an online offer seems too good to be true, it probably is and you’re being phished. Shutterstock

How to avoid getting hooked by a festive season phishing scam

Phishing attempts tend to rise during the festive season when people are more likely to respond to online marketing and to spend more money. How can you protect yourself?
We should know by now - don’t click that link. Bill Buchanan

In cybersecurity, the weakest link is … you

A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is…

Kontributor teratas

Lebih banyak