Current techniques to protect biometric details, such as face recognition or fingerprints, from hacking are effective, but advances in AI are rendering these protections obsolete.
No method is perfect, but physical security keys are a reliable form of multi-factor authentication.
Shutterstock
The danger with car hacking isn’t terrorists taking control of your car (as movies might have you think), but the age old problem of dodgy mechanics getting you to spend more on servicing it.
We need a cyber safety equivalent to the Slip! Slop! Slap! campaign to nudge behavioural change in the community.
Shutterstock
If the next government is serious about protecting Australian businesses and families, here are seven concrete actions it should take immediately upon taking office.
The curriculum is already overcrowded. Can we really ask teachers to take this on too?
www.shutterstock.com
While shifting cyber safety education beyond privacy is a step in the right direction, teachers already have to contend with an overcrowded curriculum.
University of Canberra Vice-Chancellor Deep Saini and Michelle Grattan talk about the week in politics.
Prime Minister Morrison said there was no evidence of electoral interference linked to a hack of the Australian Parliament House computer network.
from www.shutterstock.com
Despite the uncertainties – and dangers – of retaliating against suspected cyberattackers, a surprising number of companies and countries are exploring doing just that.
Many people don’t want to let go of how they create passwords.
Tono Balaguer/Shutterstock.com
Virtual private network companies make lots of promising claims about their services. Most people don’t have the skills to double-check their providers. So this group of researchers did the testing.
If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs.
Shutterstock
The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures…
Prepare to protect yourself.
FXQuadro/Shutterstock.com
As the number of ‘internet of things’ devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
Scott Olson/AFP
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
What dangerous experiences lurk behind the use of this trackpad?
Amy Walters/Shutterstock.com