Poor cybersecurity awareness and training of users is one reason for the high incidence of successful cyber-attacks in South Africa.
Former Twitter security chief alleges in a whistleblower complaint gross security malpractice, with many employees having access to the social media platform’s code as well as user data.
The Agricultural Internet of Things is making farming more efficient. An information technology expert describes some of the challenges of working with sensors and antennas underground.
Bringing advanced technologies to the ancient practice of farming could help feed the world’s growing population, but it could also open the door for people looking to disrupt the global food system.
Digital traces are already being used as evidence to prosecute people accused of seeking abortions.
Pacific island nations are working to secure their people and infrastructure from cyber attacks.
Between growing scam and hack incidents, global cyber warfare threats, and the increasing connectivity of our systems – keeping Australia’s cyber defences up is of the utmost importance.
Many organisations abide by a “zero trust” rule wherein absolute trust is placed in nothing, apart from a central identity and access management system. But what happens when this system is breached?
An integrative cybersecurity and data protection program will help firms adjust their management protocols and be better prepared for future cybersecurity trends.
Deepfakes — manipulated images of people — can be difficult to distinguish from the real thing, and this has terrifying consequences for democracy.
The social media strategies of many parties and candidates aim to bypass mainstream media to speak directly to voters, but they are often not as sophisticated as is assumed.
It’s true that phones aren’t as prone to viruses as computers – but they’re still far from immune.
Cloud services are convenient, but if an organization isn’t careful about how it uses them, the services can also give data thieves an opening.
One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
Here’s what happens when you scan one of those ubiquitous two-dimensional black-and-white patterns.
By linking different issues together, organisations show the importance of approaching information disorder as a complex problem requiring various responses.
Russian hackers have been attacking Ukraine for years, but with help from US government agencies, businesses and universities, Ukraine’s cyber defenses have grown stronger.
Cyberattacks can be devastating, just not on the battlefield, according to researchers who looked at 10 years of armed conflicts around the world.
The funds are allocated across a ten-year period, with most of the money redirected from defence spending.
With Russia poised to launch cyberattacks on US targets, many local governments find themselves without the staff or resources to even recognize when they’re under attack.