‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation 38,8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Do you want to be friends with this person?
Almost every online deception, fraud and scam – even propaganda and misinformation campaigns – begins with a fake social media profile. How do fakers get real people to agree to be friends?
Fraudsters use specific social engineering tactics to gain the trust of their victims.
Australians have lost more than $76 million to fraud so far this year. These are the tactics that online offenders use to dupe their victims.
For safety, look to text-only messaging.
The Conversation, via picascii.com, publicdomainpictures.net and kelvinsong
It's impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It's time to return to plain, text-only email.
Students infiltrate a host computer under the watchful eye of a mentor during a capture the flag exercise.
Cyber Security Summer School is a chance for researchers to test their skills during live penetration testing.
Cybersecurity jargon can be intimidating, but it needn’t be.
To protect ourselves online, we should all understand a few key terms.
Small outfits need cyberprotection too.
kirill_makarov via shutterstock.com
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
Phishing for information and money.
You know it's a serious problem when even Google and Paypal have been targeted.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
Not this kind of spearfishing – the kind that involves a computer.
Underwater image via shutterstock.com
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
Internet scamming is proving to be an attractive career to a considerable number of Nigerian students.
Internet fraud – or ‘yahoo-yahoo’ – has become a way of life for some young Nigerian con-artists.
Gah! What did I just do?!?!
Image of hands and computer via shutterstock.com
We are deepening our understanding of why people fall victim to the attacks in the first place.
Cybercriminals take advantage of computer users’ lack of education about their methods.
Cyberattacks are on the rise in South Africa. New legislation is important, but it won't solve the problem if it's not accompanied by user education.
If an online offer seems too good to be true, it probably is and you’re being phished.
Phishing attempts tend to rise during the festive season when people are more likely to respond to online marketing and to spend more money. How can you protect yourself?
We all need to clean up our online acts.
Intel Free Press
No matter how strong an organization's cybersecurity, our own bad behavior could make us the "unintentional insiders" for the next big hack.
Oops, did I click something dangerous?
Cybersecurity is only as strong as the people behind the computer. And we often don't understand the risks when we click a link.
We should know by now - don’t click that link.
A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is…