Articles on Hacking

Displaying 141 - 160 of 214 articles

When the SWAT team bursts into your bedroom, it’s not only unpleasant but potentially deadly. Jason Eppink/Flickr

Doxxing, swatting and the new trends in online harassment

Two new forms of online harassment, 'doxxing' and 'swatting', are increasing in frequency. Here's how to protect yourself from them.
If you’ve been hacked or had your identity stolen, time is of the essence when it comes to minimising the damage. Image sourced from Shutterstock.com

The first 72 hours are critical for hacking victims

Preventing and responding to the hacking epidemic is not a problem for one group or organisation to solve. And what happens in the first 72 hours can make all the difference.
These days anyone can download the tools used for cyber crime. Ivan David Gomez Arce/Flickr

Hackers’ kit bag: the tools that terrorise the internet

Hacking is a state of mind. Traditionally, hackers like to discover, understand and share the secrets they expose. They like to laugh at the dumb things they find. They’re not necessarily in it for the…
Harnessing the quantum property of light takes security to the next level. Boris Skoric

Quantum physics can fight fraud by making card verification unspoofable

Decades of data security research have brought us highly reliable, standardized tools for common tasks such as digital signatures and encryption. But hackers are constantly working to crack data security…
Hacking and making a profit isn’t as easy as it looks. Reuters

Hard Evidence: how much is cybercrime really costing us?

In the wake of the latest high-profile hack of Sony and claims of “cyber-vandalism” being thrown about, it’s normal to feel a sense of unease. Just this week, yet another proposal for new cybersecurity…
That poster’s all you’re gonna get. Justin Lane/EPA

Sony must release The Interview

Is The Interview a good movie? We may never know. After the theft by North Korean hackers of vast quantities of confidential emails, pay information and unreleased film scripts, the drip-drip leaking of…
The consent policies of popular websites would take a month to read. Perhaps including a sign like this would be a simpler solution. Shutterstock

Personal privacy is eroding as consent policies of Google and Facebook evoke ‘fantasy world’

We live in a world increasingly dominated by our personal data. Some of those data we choose to reveal, for example, through social media, email and the billions – yes, billions – of messages, photos and…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
The G20 might seem like a tasty target for hackers, but any real threats will come from elsewhere. Imaginary Museum Projects: News Tableaus/Flickr

Cyber threats at the G20 (and why they don’t pose much of a risk)

You might have seen reports that the Australian Signals Directorate (ASD) has issued cyber security advice ahead of the G20 Leaders Summit in Brisbane this weekend. So under the watchful eye of the media…
With a few lines of code, cyber criminals and governments have able to infiltrate the security of banks and retailers and steal hundreds of millions in customer records. Shutterstock

JPMorgan hack signals banks and retailers can do more to keep our data safe

JPMorgan Chase early last month disclosed that cyber thieves pilfered account data on 76 million households and seven million small businesses over the summer, one of the biggest breaches ever and only…

Top contributors

More