Targeted advertising: good for Facebook and Google, not so good for you.
Google and Facebook reign supreme over digital advertising. Yet the Cambridge Analytica scandal, and when the effectiveness of this advertising seems limited, should we ban this model?
Probes that can transmit electricity inside the skull raise questions about personal autonomy and responsibility.
Where does responsibility lie if a person acts under the influence of their brain implant? As neurotechnologies advance, a neuroethicist and a legal expert write that now’s the time to hash it out.
White House counselor Kellyanne Conway.
US law limits public employees’ political activity. But in today’s hyperpartisan political world, it’s getting harder for public employees to navigate between professional neutrality and politics.
It seems near impossible to keep control of our personal data – and Facebook does anything but help.
Do you think you’ve set up your Facebook account so that only your friends can see your information? Think again…
How secure is your password?
Passwords are an integral part of our daily IT life – and a major source of vulnerabilities. What are the problems and risks, and how can we reduce them?
Servers hosting your favorite websites may be subject to denial-of-service attacks.
The Internet provides us with many services thanks to sites hosted by servers. These may be the victims of denial-of-service attacks that paralyze the entire server.
Money is a crucial target for North Korea’s hacking efforts.
North Korea’s cyber army is closely controlled by the ruling regime – a key difference from other countries’ cyberattack and espionage groups.
Hacks like the one on Coincheck expose gullible investors to risk, but it also means funds could be flowing undetected into the hands of money launderers and terrorists.
Australian regulators face similar problems as their Australian counterparts in getting cryptocurrency platforms to regulate and prosecuting them when things go wrong.
Chips from the biggest chipmakers – Intel, AMD and ARM – all contain serious security flaws.
Wasting time on the internet at work could be putting your company’s cyber-security at risk.
The public disclosures Uber has made so far make it very difficult to identify Australians caught up in the data breach.
Uber has admitted that the 2016 data breach puts at risk the personal information of 57 million users.
Who should be allowed inside?
Scholars dig in to the debate on whether police should be able to defeat or circumvent encryption systems.
Staff at the Korea Internet and Security Agency in Seoul, South Korea monitor possible ransomware cyberattacks in May 2017.
(Yun Dong-jin/Yonhap via AP)
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
Cloud computing has become every-day tool, but its security is questionable. New methods are developed to prevent data breaches.
Cloud computing is on the rise, but so are questions about its security. This is why we need systems where the data itself enforces security, not just the cloud system within which it is contained.
WPA2 has been cracked, so it’s time to update your router.
KRACK can only be used in certain circumstances, and there are some steps you can take to keep your internet traffic safe.
U.S. President Donald Trump has taught the world many lessons since his time in office – mostly on how not to govern.
(AP Photo/Carolyn Kaster)
Love him or hate him, Donald Trump has shown us a great deal in his short time on the political stage. For that, we should be grateful. Here are the lessons taught by Prof. Trump.
There’s a global war going on, and a global arms race to go with it. It’s not a race for physical weapons, it’s a race to develop cyber weapons of psychological, emotional, financial and infrastructure attack.
Hostile foreign powers and even tech companies are not attacking us with bullets and bombs; they’re doing it with bits and bytes. It’s Cyber Security Awareness Month, so what to do about the third world war being waged in cyberspace?
South African Deputy President Cyril Ramaphosa claims the country’s security agencies hacked his emails.
It would be no surprise if Deputy President Cyril Ramaphosa’s claims of the state spying on him turn out to be true. After all, state spy agencies have been abused before in ANC factional battles.
Embedded medical devices will continue to be vulnerable to cybersecurity threats. The pacemaker depicted is not made by Abbott’s.
Pacemakers are Internet of Things devices for the human body, but they’re still not particularly secure.
Hackers will start to get help from robots and artificial intelligence soon.
It won’t be like an army of robots marching in the streets, but AI hacking is on the horizon.