Beyond neutralising the cybercriminals behind the Medibank breach, the taskforce will also seek out and attack other potential threats.
Banning cyber ransom payments might help ward off attacks, but there are some cases where organisations feel intense pressure to pay up.
In a viscous cycle, it’s also becoming harder to get cyberinsurance.
It’s reported the stolen data of more than one million Australians have already been leaked – and more is expected.
A well-known cybercrime group has threatened to release the data should the ransom not be paid.
Cyber crime is arguably the top risk now facing any business. But things need to change if cyber-insurance is to be viable for most.
Credit checks and international co-operation are crucial when it comes to tracking down cybercriminals.
The cybercrime ecosystem is vast and complex – and increasingly littered with specialists who will cheaply sell your data.
Optus used press releases, and Twitter when it could have contacted its customers by text.
As businesses establish themselves in the metaverse, the amount of financial transactions there will increase. This will come with previously unknown risks.
Poor cybersecurity awareness and training of users is one reason for the high incidence of successful cyber-attacks in South Africa.
Twitter users’ responses suggest that southern Yahoo boys are more criminalised by Nigeria’s Economic and Financial Crimes Commission than their northern counterparts. We explain why.
To combat the rise in deepfakes used in fraud, employees and investigators need to be aware of the threats involved.
An integrative cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity trends.
The lack of clear communication on COVID-19 palliatives by Nigeria’s government allowed cybercriminals to defraud vulnerable people.
A cybersecurity research group has been tracking a significant rise in the number of stolen checks being sold on sites like WhatsApp and Telegram, which often results in stolen identities.
Attackers gain the trust of vulnerable individuals to obtain sexually explicit photos or videos via the internet, and then use these materials to blackmail victims.
Start 2022 by improving your password hygiene. Ideally you can use a password manager, but at the very least make sure your financial, social and work accounts each has their own strong, unique login.
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
Indecent exposure happens digitally, too.