Current techniques to protect biometric details, such as face recognition or fingerprints, from hacking are effective, but advances in AI are rendering these protections obsolete.
The danger with car hacking isn’t terrorists taking control of your car (as movies might have you think), but the age old problem of dodgy mechanics getting you to spend more on servicing it.
Sunanda Creagh, The Conversation; Wes Mountain, The Conversation, and Bageshri Savyasachi, The Conversation
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next
The Conversation38.8 MB(download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
If another country wants to weaponise data hacked through Australia’s parliament, we’ll likely see them try to inflame religious and ethnic differences, and drive votes to minor parties.
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here’s what could happen if you do – and how you can minimise your risk.
The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures…
The European Union has issued its first fine, cracking down on companies that misuse users’ personal data. Why hasn’t the US taken a similarly strong approach?
As the number of ‘internet of things’ devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
German MPs were outraged they weren’t notified they were targets in a cyber attack, which resulted in the public release of mobile phone numbers and credit card information.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
Nir Kshetri, University of North Carolina – Greensboro
As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.