Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off.
WhataWin/iStock via Getty Images
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
HBRH / Shutterstock
Indecent exposure happens digitally, too.
Creativity can be used in countless ways – with positive or negative consequences.
Dusan Stankovic/E+ Collection via Getty Images
Parents often want their kids to be creative. But while creativity has many benefits, it can also be used for harm. Here’s how to teach kids to harness their imagination for the common good.
Australians are being bombarded with ‘missed parcel’ SMS messages that aren’t as they seem…
Vulnerable devices and systems are targets.
As schools and colleges confront the challenges of COVID-19, cybercriminals exploit weaknesses in the computer networks and online systems.
Fiona Goodall/Getty Images
As Friday’s attack by an ISIS sympathiser in a New Zealand supermarket shows, ISIS’s extreme ideology still holds strong appeal for some disaffected Muslims living in the west.
Internet crime has become attractive as a form of ‘hustle’ to many young Nigerians.
Issouf Sanogo/AFP/Getty Images)
Portraying the world of Yahoo Boys – or internet fraudsters – is a growing trend in Nigerian literature. The novels provide a scathing critique of economic exclusion.
The first ransomware attack, in 1988, was a crude effort involving virus-laden floppy disks. But in the decades since, the sophistication of malware, and the money reaped by criminals, has skyrocketed.
The recent attack on software supplier Kaseya has been labelled as the biggest global ransomware attack on record.
Ransomware has gone professional, with criminal consultants, affiliates and brokers – arresting them all will be difficult.
Olu Maintain’s hit song Yahooze is an ode to cybercrime.
Joseph Okpako/Redferns/Getty Images
Poverty aside, cultural factors like the influence of hip hop songs may also play a role in making a life of cybercrime attractive to young people.
former ASIO head David Irvine on the cyber threats Australia faces.
Michelle Grattan discusses cyber security with former chairman of the Cyber Security Cooperative Research Centre, David Irvine
The FBI’s latest cybersecurity moves bring the government into new territory – inside privately owned computers.
AP Photo/Cliff Owen
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
More than 500 million people’s details were compromised. The records include various combinations of name, email, gender, date of birth, location, relationship status and employer.
Universities are a prime target for cyber attacks and the weakest links in their defences are all the non-expert users of their systems. Teaching everyone basic cyber hygiene is vital.
Ransomware is quietly developing into one of the most disruptive – and lucrative – forms of cybercrime.
Organizations are more vulnerable to cyber-attacks as employees work from home.
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.
We unpacked a large cybercrime business network and found a group relying on business 101 tactics: VIP memberships, cheap trial offers and a customer base reluctant to spend.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
One website dedicated to tracking stolen passwords suggests there are details of currently more than 10 billion compromised accounts available online.