The ongoing pandemic has accelerated and deepened our dependency on internet technologies.
The COVID-19 pandemic has meant an increased dependence on digital technologies. However, this comes with a serious threat to our personal privacy and property.
Vulnerable devices and systems are targets.
As schools and colleges confront the challenges of COVID-19, cybercriminals exploit weaknesses in the computer networks and online systems.
Sweeping police powers for online surveillance and hacking raise concerns over privacy and security.
Despite its known vulnerabilities, SMS-based 2FA is used as a security measure by several major organisations, including the Big 4 banks.
CSIRO / AAP
The growth of online and space activity make traditional ideas of national security increasingly outdated.
Switching web service providers and providing almost $40 million from the federal budget means the census 2021 website should be safe from crashing at the crucial time this evening.
A woman holds a phone in front of the office of NSO Group, which makes a tool that can see and hear everything a phone is used for.
Jack Guez/AFP via Getty Images
A tool made for tracking criminals and terrorists has potentially been used against politicians, dissidents and journalists. Here’s how the spyware works.
Security experts can provide valuable information on vulnerabilities that could be exploited in cyberattacks.
Cyberattacks are on the rise. Canada needs to work with cybersecurity experts to enable them to identify and address security vulnerabilities.
Mobile apps on smartphones are threats to digital privacy
Yasuyoshi Chiba/AFP via Getty Images
Parties who design the technologies and platforms on which mobile apps are built and marketed must be brought within the legal accountability framework to close the privacy loop.
International power plays are a threat to a stable, open internet.
erhui1979/DigitalVision Vectors via Getty Images
The US is wrestling with the rest of the world for control of the internet. The ‘net as we know it could be a victim of the struggle.
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.
Cybersecurity is a growing global threat.
A UN working group on cybersecurity is making incremental progress in highlighting the importance of including and protecting civilians.
The two leaders ignored the most pressing global issue to concentrate on the status quo issues of security and arms control.
The first ransomware attack, in 1988, was a crude effort involving virus-laden floppy disks. But in the decades since, the sophistication of malware, and the money reaped by criminals, has skyrocketed.
The recent attack on software supplier Kaseya has been labelled as the biggest global ransomware attack on record.
Cyberwarfare will require new defensive measures by government and corporations.
Co-ordinated cyberattacks can create massive disruptions to infrastructure and supply chains. New treaties are needed to prevent cyberwarfare, but it’s challenging to predict technological advances.
The hacktivist collective ‘Anonymous’ has become just that – but the hacktivism they espoused may be set to return.
Credit bureau Equifax announced in 2017 that the personal information of 143 million Americans – about three-quarters of all adults – had been exposed in a major data breach.
AP Photo/Mike Stewart
If an organization that has your data gets hacked, your vulnerability depends on the kind of attack and the kind of data. Here’s how you can assess your risk and what to do to protect yourself.
This could have been a feisty exchange between two adversaries. But the summit was a calm affair, with each side hoping their hostile relationship could be ratcheted down a notch or two.
Colonial Pipeline storage tanks. On May 7, 2021, the company experienced a ransomware cyberattack.
(AP Photo/Seth Wenig)
The amount of online data and transactions are growing exponentially. Related is the increasing possibility of cyberattacks — one way to address these is by regulating parts of the internet.