Menu Close

Artikel-artikel mengenai Cybersecurity

Menampilkan 561 - 580 dari 686 artikel

The consent policies of popular websites would take a month to read. Perhaps including a sign like this would be a simpler solution. Shutterstock

Personal privacy is eroding as consent policies of Google and Facebook evoke ‘fantasy world’

We live in a world increasingly dominated by our personal data. Some of those data we choose to reveal, for example, through social media, email and the billions – yes, billions – of messages, photos and…
Hacking can, and should, keep us on our toes. Alexandre Dulaunoy

Wanted: trainee cyber-criminals to help solve skills shortage

The world is already short of computer security experts, but by 2017 that shortfall is going to have reached about two million. Criminal hackers cause damage running to billions of pounds every year…
Is it a crime scene or just a store checkout? Could be both. Marlith

After a data breach, it’s consumers left holding the bag

Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click “purchase…
Webcams have been made public because their passwords weren’t changed from the default. Flickr/Cory Doctorow

How to keep the world’s eyes out of your webcam

There are concerns that thousands of private webcams around the world could be streaming live images to anybody who wishes to view them – without their owner knowing – thanks to a Russian website providing…
There’s no physical fences in cyberspace, that doesn’t mean there’s no border controls. paolo_cuttitta

Russia and China prepare to fight US internet domination

While there is only one world power on the internet, that situation will not last forever. The internet’s underpinning technologies were mostly created in the US, the initial networks were based there…
The G20 might seem like a tasty target for hackers, but any real threats will come from elsewhere. Imaginary Museum Projects: News Tableaus/Flickr

Cyber threats at the G20 (and why they don’t pose much of a risk)

You might have seen reports that the Australian Signals Directorate (ASD) has issued cyber security advice ahead of the G20 Leaders Summit in Brisbane this weekend. So under the watchful eye of the media…
We should know by now - don’t click that link. Bill Buchanan

In cybersecurity, the weakest link is … you

A chain is only as strong as its weakest link. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is…
With a few lines of code, cyber criminals and governments have able to infiltrate the security of banks and retailers and steal hundreds of millions in customer records. Shutterstock

JPMorgan hack signals banks and retailers can do more to keep our data safe

JPMorgan Chase early last month disclosed that cyber thieves pilfered account data on 76 million households and seven million small businesses over the summer, one of the biggest breaches ever and only…
Call that security? How safe is your own password from hackers. Flickr/Victor Bayon

The quick brown fox can help secure your passwords online

In 2004 Bill Gates pronounced usernames and passwords dead. Gates, a man consistently thinking ahead of the crowd, was right. Most of us – including our employers and the online services we rely on – just…
The internet has made crime bigger in scope and easier in practice. Photosani/Shutterstock

In the web’s hidden darknet, criminal enterprise is thriving

Criminals have always done their best to use new technology to their advantage and the rapid development of new digital technologies and online markets has provided the criminal entrepreneur with as much…

Kontributor teratas

Lebih banyak