Boris Zhitkov/Getty Images
Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
These photos are of real people.
Shutterstock
AI-generated faces are now readily available, and have been used in identity fraud, catfishing and cyber warfare.
Janelle Lugge/Shutterstock
Port operator DP World handles roughly 40% of Australia’s sea freight. Over the weekend its ports were disrupted by what appears to be a malicious, targeted cyberattack.
BigNazik/GettyImages
There are different tactics that governments can use to block the internet, some more sophisticated than others.
AI has major potential in medical diagnostics.
Gorodenkoff / Shutterstock
We need to be mindful of the potential short- and medium-term risks of AI.
Building a profile of someone can make it easier for criminals to gain access to their personal accounts.
Metamorworks / Shutterstock
AI could allow cybercriminals to operate with greater efficiency, targeting more people at once.
Scammers are robbing institutions of billions of dollars.
Adrià Fruitós
Check fraud is one of history’s oldest financial crimes and criminals are finding new ways to use it to steal billions from banks.
Loot stolen from the U.S. Postal Service is displayed on the dark web.
Via Evidence-Based Cybersecurity Research Group
Cyber bank fraud is on the rise. Here are some important ways to protect yourself.
Dennis Desmond
The Five Eyes alliance is critical to hunting and detecting foreign cyber actors, but tends to work in secret.
Shutterstock AI
The Snake network has been detected in more than 50 countries, including Australia.
Perpetrators often utilize the numerous social media, messaging apps, games and forums available online to initiate contact with potential victims.
(Shutterstock)
Many children and adolescents fall victim to online exploitation, but there are some steps parents can take to protect their children online.
Shutterstock
A new proposal aims to prevent SMS scams by introducing a national SMS sender ID registry.
Malware is designed to hide in your device
Jaiz Anuar/Shutterstock
How to know if your computers are infected for use in a distributed denial of service attack.
Shutterstock
Beyond neutralising the cybercriminals behind the Medibank breach, the taskforce will also seek out and attack other potential threats.
Shutterstock
Banning cyber ransom payments might help ward off attacks, but there are some cases where organisations feel intense pressure to pay up.
Many businesses simply choose to pay a ransom than suffer the consequences of a cyber attack.
Zephyr_p/Shutterstock
In a viscous cycle, it’s also becoming harder to get cyberinsurance.
Diego Fedele/AAP
It’s reported the stolen data of more than one million Australians have already been leaked – and more is expected.
Shutterstock
A well-known cybercrime group has threatened to release the data should the ransom not be paid.
Shutterstock
Cyber crime is arguably the top risk now facing any business. But things need to change if cyber-insurance is to be viable for most.
Nathan Dumlao / Unsplash
Credit checks and international co-operation are crucial when it comes to tracking down cybercriminals.