Organizations are more vulnerable to cyber-attacks as employees work from home.
To anticipate and protect themselves against the rise in cyberattacks, organizations need to consider new vulnerabilities that emerge when employees work from home.
The outdated Microsoft operating system was recently dumped online in a huge leak. Hackers can now scour it for bugs to exploit.
In June 2017, demonstrators (here in New York) demanded that light be shed on possible Russian interference in the 2016 election.
Eduardo Munoz Alvarez/AFP
Russian interference deeply marked the 2016 American presidential election. Four years later, let’s analyze the form and impact of disinformation coming from Russia.
Australia’s new voluntary code of practice to make IoT devices more secure may expose consumers to greater risks.
Johnson Lai / AP
Taiwan has a population of over 20 million people and no new cases of coronavirus since mid-April. Embracing ‘digital democracy’ and ‘hacktivism’ have been the keys to their success.
Two-factor authentication is certainly an added layer of security as we traverse the online world. But it comes in various forms, and they’re not all equally protective.
With the coronavirus pandemic, people are looking at more ways to explore and conduct research from home.
DIY labs have disrupted industries from alcohol to pharmaceuticals. During the coronavirus pandemic, curious people have more opportunities to innovate from home.
Legislation expected to be put to Parliament later this year may very well fall short due to COVID-19’s budget impacts. But until we strengthen our cyber defences, we’re all at risk.
All is not as it appears on social media.
filadendron/E+ via Getty Images
A social media researcher explains how bots and sock puppet accounts manipulate and polarize public debate.
Mick Tsikas/AAP Image
Australia is coming under sustained cyber attack by a ‘state-based’ actor, says Prime Minister Scott Morrison, as hackers try to exploit vulnerabilities in business and government software systems.
Website defacing can shut down businesses that have moved online during the coronavirus pandemic.
Siriporn Kaenseeya/EyeEm via Getty Images
Vulnerable websites are popping up as organizations move online during the coronavirus pandemic – and hackers have more time at home alone. The result is more websites falling victim to defacement.
Real-time cyberattacks on a display at the 175th Cyberspace Operations Group of the Maryland Air National Guard.
U.S. Air Force photo by J.M. Eddins Jr.
In the murky world of cyber espionage and cyber warfare, effective deterrence has long been considered out of reach. A government report argues it’s time to change that.
Instead of going after large corporate networks, which often have multiple defenses, cybercriminals can now simply target people’s home networks.
Two CubeSats, part of a constellation built and operated by Planet Labs Inc. to take images of Earth, were launched from the International Space Station on May 17, 2016.
SpaceX and other companies are rushing to put thousands of small, inexpensive satellites in orbit, but pressure to keep costs low and a lack of regulation leave those satellites vulnerable to hackers.
Ransomware attacks are becoming increasingly complex, as hackers find creative ways to beat ordinary systems of defence.
A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
Unlike purpose-built data storage systems, a data lake can be used to dump data in its original form. This data usually remains unsupervised.
A major cyber attack on a data lake could have immense consequences for any of us. And the damage could be felt anywhere from banking to the healthcare sector.
It’s been reported that names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, passport details and student academic records were accessed.
The worst-case scenario is that hackers still have access to the university systems via a backdoor and are siphoning off critical data as it emerges.
Biometrics like retinal scans is a new frontier in the privacy wars.
States like California have been at the forefront of privacy innovation in recent decades. A possible federal law could bring their experimentation to a halt, harming consumers.
Society needs cybersecurity professionals who can protect systems and mitigate damage.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.