Modern web browsers are increasingly becoming like virtual computers, able to send email and play music and videos. The downside is it’s a new way for hackers to get into your computer.
Richard Forno, University of Maryland, Baltimore County
Chinese state-sponsored hackers are targeting critical infrastructure. Here’s what they’re doing, how the US government is responding and how you can help.
Taylor Swift performs in LA, August 2023.
AP Photo/Chris Pizzello
Australian fans who didn’t manage to snag Eras tickets are on the hunt – and scammers are capitalising on this. Here’s everything you need to know to protect yourself.
People in the U.S. with limited English proficiency are particularly vulnerable to cybercrime.
LPETTET/E+ via Getty Images
In what is colourfully termed a ‘brute force’ attack, hackers use bots to test millions of username and password combinations on different websites – until they find a match.
Prolific and highly profitable, LockBit provides ransomware as a service. Aspiring cybercriminals sign up to the scheme, and the group takes a cut. Here’s how it works.
Port operator DP World handles roughly 40% of Australia’s sea freight. Over the weekend its ports were disrupted by what appears to be a malicious, targeted cyberattack.
Richard Forno, University of Maryland, Baltimore County
‘Star Trek: Picard’ is set 400 years in the future, but, like most science fiction, it deals with issues in the here and now. The show’s third and final season provides a lens on cybersecurity.
The federal government has a lot of cybersecurity resources, but the private sector plays a key role in national cyber defense.
U.S. government
Richard Forno, University of Maryland, Baltimore County
The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.
Hackers are just one part of a supply chain in a multimillion-dollar black market for stolen data.
Peach_iStock via Getty Images
The hacker who steals your data is just one part of an illicit supply chain featuring producers, wholesalers, distributors and consumers – a black-market industry worth millions of dollars.
Peiter “Mudge” Zatko was Twitter’s security chief. What he claims he found there is a security nightmare.
Photo by Matt McClain/The Washington Post via Getty Images
Richard Forno, University of Maryland, Baltimore County
Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.
Your digital footprints can give hackers clues about you that they can use to trick you.
Ivan/Flickr
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
As missiles rain down on Ukraine’s telecommunications infrastructure, including Kyiv’s TV tower, hackers have been attacking in cyberspace.
Sergei Supinsky/AFP via Getty Images
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine.
Russian Defense Ministry Press Service via AP