Bringing advanced technologies to the ancient practice of farming could help feed the world’s growing population, but it could also open the door for people looking to disrupt the global food system.
Between growing scam and hack incidents, global cyber warfare threats, and the increasing connectivity of our systems – keeping Australia’s cyber defences up is of the utmost importance.
Many organisations abide by a “zero trust” rule wherein absolute trust is placed in nothing, apart from a central identity and access management system. But what happens when this system is breached?
Organizations have significantly increased their use of data and the internet because of the pandemic, leading to new cyberattack and cybersecurity risks.
THE CANADIAN PRESS/Jonathan Hayward
Camélia Radu, Université du Québec à Montréal (UQAM) and Nadia Smaili, Université du Québec à Montréal (UQAM)
An integrative cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity trends.
Technology that can produce deepfakes is widely available.
(Shutterstock)
The social media strategies of many parties and candidates aim to bypass mainstream media to speak directly to voters, but they are often not as sophisticated as is assumed.
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
QR codes are visual patterns that store data smartphones can read.
AP Photo/Vincent Yu
By linking different issues together, organisations show the importance of approaching information disorder as a complex problem requiring various responses.
As missiles rain down on Ukraine’s telecommunications infrastructure, including Kyiv’s TV tower, hackers have been attacking in cyberspace.
Sergei Supinsky/AFP via Getty Images
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
There is little evidence that Russia has coordinated cyber operations with conventional military operations in Ukraine.
Russian Defense Ministry Press Service via AP
The funds are allocated across a ten-year period, with most of the money redirected from defence spending.
Hackers can disrupt local government services, like this library in Willmar, Texas. The town suffered a cyberattack in August 2019.
AP Photo/Tony Gutierrez
Richard Forno, University of Maryland, Baltimore County
With Russia poised to launch cyberattacks on US targets, many local governments find themselves without the staff or resources to even recognize when they’re under attack.
From jamming satellite signals to spreading disinformation, Russia’s military has sophisticated technologies it’s bringing to the battlefield in Ukraine.
There’s an alleged global network of cyber activists operating under the Anonymous name. Knowing who is responsible for what will become increasingly difficult as more cyber attacks happen.