It’s been reported that names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, passport details and student academic records were accessed.
The worst-case scenario is that hackers still have access to the university systems via a backdoor and are siphoning off critical data as it emerges.
WikiLeaks founder Julian Assange leaves Southwark Crown Court in London, May 1, 2019.
Julian Assange's indictment under the Espionage Act, a sweeping law with heavy penalties for unauthorized receiving or disclosing of classified information, poses a threat to press freedom.
The latest malware is designed especially to make small companies pay through the nose for their data.
Biometric systems are increasingly used in our civil, commercial and national defence applications.
Current techniques to protect biometric details, such as face recognition or fingerprints, from hacking are effective, but advances in AI are rendering these protections obsolete.
No method is perfect, but physical security keys are a reliable form of multi-factor authentication.
Do you receive a code via SMS message, email or voice call to sign into your bank account? This security method is no longer considered very secure.
Lego Mechanic might look sweet and innocent, but what’s that smile really hiding?
The danger with car hacking isn't terrorists taking control of your car (as movies might have you think), but the age old problem of dodgy mechanics getting you to spend more on servicing it.
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation 38.8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Your voting preference might be subtly influenced by social media exposure in the lead up to an election.
If another country wants to weaponise data hacked through Australia's parliament, we'll likely see them try to inflame religious and ethnic differences, and drive votes to minor parties.
States that come under cyber attack from state actors have few good legal remedies available to them.
Cyber attacks are a real and increasing threat to Australia, and the law lags a long way behind in both protection and recourse.
Prime Minister Morrison said there was no evidence of electoral interference linked to a hack of the Australian Parliament House computer network.
For many of us, this hack seems to have come out of the blue. But cyber measures targeting Australian government infrastructure are the 'new normal'.
Many people don’t want to let go of how they create passwords.
When it comes to picking a new password, people's resistance to change can make them less secure online.
A link is a mechanism for data to be delivered to your device.
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here's what could happen if you do – and how you can minimise your risk.
If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs.
The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures...
True love could be hiding inside mounds of data.
Trying to optimize the search for love can be naive. Using statistics and measurements isn't necessarily the best way to find a human partner.
They’re small and well-connected, but how safe are ‘internet of things’ devices?
As the number of 'internet of things' devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
The German government held a press conference in Berlin on January 4 about a hack which targeted German politicians.
German MPs were outraged they weren't notified they were targets in a cyber attack, which resulted in the public release of mobile phone numbers and credit card information.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
Emmanuel Macron called for support for “open, secure, stable, accessible and peaceful cyberspace”.
The French president's Paris Call is for international collaboration to make the Internet safer. What are the advances and limitations of this text?
Do people need insurance against hacking?
As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
Minuscule computer hardware could be spying on top tech firms.
We've no way of knowing if allegations that China implanted secret spying microchips in widely used computers are true.