Menu Close

Articles on Hacking

Displaying 41 - 60 of 251 articles

Digital attacks can cause havoc in different places all at the same time. Pushish Images/Shutterstock.com

A cyberattack could wreak destruction comparable to a nuclear weapon

Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There’s less attention to the dangers of cyberattacks, which could cripple key utilities.
It’s been reported that names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, passport details and student academic records were accessed. www.shutterstock.com

19 years of personal data was stolen from ANU. It could show up on the dark web

The worst-case scenario is that hackers still have access to the university systems via a backdoor and are siphoning off critical data as it emerges.
WikiLeaks founder Julian Assange leaves Southwark Crown Court in London, May 1, 2019. REUTERS/Henry Nicholls

Assange’s new indictment: Espionage and the First Amendment

Julian Assange’s indictment under the Espionage Act, a sweeping law with heavy penalties for unauthorized receiving or disclosing of classified information, poses a threat to press freedom.
Shutterstock/AAP/The Conversartion

‘I think we should be very concerned’: A cyber crime expert on this week’s hack and what needs to happen next

‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next. The Conversation38.8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs. Shutterstock

Cybersecurity: high costs for companies

The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures…
True love could be hiding inside mounds of data. xtock/Shutterstock.com

Can you life-hack your way to love?

Trying to optimize the search for love can be naive. Using statistics and measurements isn’t necessarily the best way to find a human partner.
Should privacy mean different things depending which side of the Atlantic you live on? pixinoo/Shutterstock.com

Data privacy rules in the EU may leave the US behind

The European Union has issued its first fine, cracking down on companies that misuse users’ personal data. Why hasn’t the US taken a similarly strong approach?
They’re small and well-connected, but how safe are ‘internet of things’ devices? BeeBright/Shutterstock.com

The quiet threat inside ‘internet of things’ devices

As the number of ‘internet of things’ devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.

Top contributors

More