A cybersecurity research group has been tracking a significant rise in the number of stolen checks being sold on sites like WhatsApp and Telegram, which often results in stolen identities.
Attackers gain the trust of vulnerable individuals to obtain sexually explicit photos or videos via the internet, and then use these materials to blackmail victims.
Start 2022 by improving your password hygiene. Ideally you can use a password manager, but at the very least make sure your financial, social and work accounts each has their own strong, unique login.
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
Parents often want their kids to be creative. But while creativity has many benefits, it can also be used for harm. Here’s how to teach kids to harness their imagination for the common good.
As Friday’s attack by an ISIS sympathiser in a New Zealand supermarket shows, ISIS’s extreme ideology still holds strong appeal for some disaffected Muslims living in the west.
Portraying the world of Yahoo Boys – or internet fraudsters – is a growing trend in Nigerian literature. The novels provide a scathing critique of economic exclusion.
The first ransomware attack, in 1988, was a crude effort involving virus-laden floppy disks. But in the decades since, the sophistication of malware, and the money reaped by criminals, has skyrocketed.
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
More than 500 million people’s details were compromised. The records include various combinations of name, email, gender, date of birth, location, relationship status and employer.
Universities are a prime target for cyber attacks and the weakest links in their defences are all the non-expert users of their systems. Teaching everyone basic cyber hygiene is vital.
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.