Menu Close

Articles on Phishing

Displaying 21 - 40 of 42 articles

Elements of smart homes, including thermostats, may be vulnerable to hackers. Ann Hermes/The Christian Science Monitor via Getty Images

‘Internet of things’ could be an unseen threat to elections

Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
Ransomware attacks are becoming increasingly complex, as hackers find creative ways to beat ordinary systems of defence. christiaancolen/flickr

Hackers are now targeting councils and governments, threatening to leak citizen data

A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
As our worlds are become increasingly digitised, we’re starting to rely more on machines and devices for everyday tasks. But in an age when even pacemakers can be hacked, how do we know when and who to trust? SHUTTERSTOCK

Would you notice if your calculator was lying to you? The research says probably not

Research shows we’re pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Shutterstock/AAP/The Conversartion

‘I think we should be very concerned’: A cyber crime expert on this week’s hack and what needs to happen next

‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next The Conversation38.8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Do you want to be friends with this person? Sasun Bughdaryan

Why do so many people fall for fake profiles online?

Almost every online deception, fraud and scam – even propaganda and misinformation campaigns – begins with a fake social media profile. How do fakers get real people to agree to be friends?
For safety, look to text-only messaging. The Conversation, via picascii.com, publicdomainpictures.net and kelvinsong

The only safe email is text-only email

It’s impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It’s time to return to plain, text-only email.
Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most. Shutterstock

Is cyberspace the latest conflict frontier on the African continent?

Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
If an online offer seems too good to be true, it probably is and you’re being phished. Shutterstock

How to avoid getting hooked by a festive season phishing scam

Phishing attempts tend to rise during the festive season when people are more likely to respond to online marketing and to spend more money. How can you protect yourself?

Top contributors

More