The use of deepfakes by criminals is on the rise, costing individuals and organizations billions of dollars in losses annually.
To combat the rise in deepfakes used in fraud, employees and investigators need to be aware of the threats involved.
Organizations have significantly increased their use of data and the internet because of the pandemic, leading to new cyberattack and cybersecurity risks.
THE CANADIAN PRESS/Jonathan Hayward
An integrative cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity trends.
Cybercriminals exploited COVID-19 induced interventions in Nigeria.
Issouf Sanogo/AFP via Getty Images
The lack of clear communication on COVID-19 palliatives by Nigeria’s government allowed cybercriminals to defraud vulnerable people.
Mailboxes are increasingly becoming the scene of a crime.
GregAIT/E+ via Getty Images
A cybersecurity research group has been tracking a significant rise in the number of stolen checks being sold on sites like WhatsApp and Telegram, which often results in stolen identities.
Attackers gain the trust of vulnerable individuals to obtain sexually explicit photos or videos via the internet, and then use these materials to blackmail victims.
Start 2022 by improving your password hygiene. Ideally you can use a password manager, but at the very least make sure your financial, social and work accounts each has their own strong, unique login.
Chances are some of your data has already been stolen, but that doesn’t mean you should shrug data breaches off.
WhataWin/iStock via Getty Images
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
HBRH / Shutterstock
Indecent exposure happens digitally, too.
Creativity can be used in countless ways – with positive or negative consequences.
Dusan Stankovic/E+ Collection via Getty Images
Parents often want their kids to be creative. But while creativity has many benefits, it can also be used for harm. Here’s how to teach kids to harness their imagination for the common good.
Australians are being bombarded with ‘missed parcel’ SMS messages that aren’t as they seem…
Vulnerable devices and systems are targets.
As schools and colleges confront the challenges of COVID-19, cybercriminals exploit weaknesses in the computer networks and online systems.
Fiona Goodall/Getty Images
As Friday’s attack by an ISIS sympathiser in a New Zealand supermarket shows, ISIS’s extreme ideology still holds strong appeal for some disaffected Muslims living in the west.
Internet crime has become attractive as a form of ‘hustle’ to many young Nigerians.
Issouf Sanogo/AFP/Getty Images)
Portraying the world of Yahoo Boys – or internet fraudsters – is a growing trend in Nigerian literature. The novels provide a scathing critique of economic exclusion.
The first ransomware attack, in 1988, was a crude effort involving virus-laden floppy disks. But in the decades since, the sophistication of malware, and the money reaped by criminals, has skyrocketed.
The recent attack on software supplier Kaseya has been labelled as the biggest global ransomware attack on record.
Ransomware has gone professional, with criminal consultants, affiliates and brokers – arresting them all will be difficult.
Olu Maintain’s hit song Yahooze is an ode to cybercrime.
Joseph Okpako/Redferns/Getty Images
Poverty aside, cultural factors like the influence of hip hop songs may also play a role in making a life of cybercrime attractive to young people.
former ASIO head David Irvine on the cyber threats Australia faces.
Michelle Grattan discusses cyber security with former chairman of the Cyber Security Cooperative Research Centre, David Irvine
The FBI’s latest cybersecurity moves bring the government into new territory – inside privately owned computers.
AP Photo/Cliff Owen
The courts have given the government the authority to hack into private computers unannounced. The action addresses a clear threat, but it also sets an unsettling precedent.
More than 500 million people’s details were compromised. The records include various combinations of name, email, gender, date of birth, location, relationship status and employer.