The German government held a press conference in Berlin on January 4 about a hack which targeted German politicians.
German MPs were outraged they weren’t notified they were targets in a cyber attack, which resulted in the public release of mobile phone numbers and credit card information.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
Lenscap Photography via Shutterstock
As the May government crumbles, there is new impetus for reviving part two of Lord Leveson’s inquiry into press misconduct.
Emmanuel Macron called for support for “open, secure, stable, accessible and peaceful cyberspace”.
The French president’s Paris Call is for international collaboration to make the Internet safer. What are the advances and limitations of this text?
Do people need insurance against hacking?
As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
Minuscule computer hardware could be spying on top tech firms.
We’ve no way of knowing if allegations that China implanted secret spying microchips in widely used computers are true.
There are several flow-on effects from the recent Facebook hack.
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
BA’s handling of the latest corporate cyber attack shows a catalogue of missed opportunities.
Researchers used a fax machine that wasn’t even connected to the internet to break into a computer network.
A serious security threat was found in popular video game Fortnite’s installation method after it bypassed Google’s official app store.
Australia has one of the most secure electoral systems imaginable thanks to paper ballots. Cybersecurity experts caution against e-voting.
Malicious and criminal attacks were the cause of 59% of data breaches in the last three months, according the latest reported figures.
Who’s in control of what’s flowing in these wires?
D Sharon Pruitt
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Cybersecurity is an increasingly relevant concern in our society, but pop culture tells us virtually nothing useful about it.
The Australian National University has been working with intelligence agencies to minimise the impact of a cyber attack on its systems.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here’s how you can protect yourself.
With so many reports of data breaches, it is easy to tune out to what is happening.
Data breaches are fact of modern life. It’s likely each of us will have our personal information compromised at some point. Here’s how to reduce the risk and limit the damage if and when it occurs.
Distributed Denial of Service (DDoS) attacks are up 16% in the last year.
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.
Chips with everything.
Sweden’s deep relationship with digital technology helps explain why its biohacking scene is so unique.
A new act is trying to lock down cyber crime in Kenya.
Kenya’s new Computer and Cyber Crime Act must not be abused by the criminal justice system.