Articles on Hacking

Displaying 1 - 20 of 168 articles

The Australian National University has been working with intelligence agencies to minimise the impact of a cyber attack on its systems. Mark爱生活/Flickr

How Australian universities can get better at cyber security

Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys. Shutterstock

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it

Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.
Probes that can transmit electricity inside the skull raise questions about personal autonomy and responsibility. Hellerhoff

It’s not my fault, my brain implant made me do it

Where does responsibility lie if a person acts under the influence of their brain implant? As neurotechnologies advance, a neuroethicist and a legal expert write that now's the time to hash it out.
How secure is your password? Avi Richards/Unsplash

Passwords: security, vulnerability, constraints

Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
Servers hosting your favorite websites may be subject to denial-of-service attacks. Visualhunt

When the Internet goes down

The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Money is a crucial target for North Korea’s hacking efforts. rega rega/Shutterstock.com

North Korea’s growing criminal cyberthreat

North Korea's cyber army is closely controlled by the ruling regime – a key difference from other countries' cyberattack and espionage groups.
Hacks like the one on Coincheck expose gullible investors to risk, but it also means funds could be flowing undetected into the hands of money launderers and terrorists. www.shutterstock.com

What the Coincheck hack tells us about how Australian regulators will handle a cryptocurrency hack

Australian regulators face similar problems as their Australian counterparts in getting cryptocurrency platforms to regulate and prosecuting them when things go wrong.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017. (Yun Dong-jin/Yonhap via AP)

Ransomware like Bad Rabbit is big business

Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches. Mark Warner/Flickr

Why we need to improve cloud computing’s security

Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.

Top contributors

More