While the data from a fingerprint is very hard to retrieve, cybercriminals can get around biometric technology in various ways. And having a weak passcode is like giving them a hall pass.
Introduced properly, 5G could have an enormous impact. We are placing it at risk.
A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
Many sites offer the ability to 'opt out' of targeted advertisements, but doing so isn't easy. Simplifying and standardizing opt-outs would help improve privacy on the web.
People are more willing to participate in fitness tracker-based insurance policies when they are in control of their participation.
A new act requires that all nonsensitive government data be made available publicly by January 2020. But the plan could open up new privacy issues.
While shifting cyber safety education beyond privacy is a step in the right direction, teachers already have to contend with an overcrowded curriculum.
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
A cybersecurity expert offers tips to keep high schoolers safe on mobile devices, computers, games and social media.
Unless you take action to remove yourself before October 15, the federal government will make a digital copy of your medical record, store it centrally, and give numerous people access to it.
My Health Record is a step towards empowering patients with greater knowledge about their health – and could help save lives in emergencies.
Data breaches are fact of modern life. It's likely each of us will have our personal information compromised at some point. Here's how to reduce the risk and limit the damage if and when it occurs.
In a complex environment with massive numbers of internet-connected devices, the key barrier to better cybersecurity isn't funding: It's ensuring staff at all levels take action against the threat.
Do you think you’ve set up your Facebook account so that only your friends can see your information? Think again…
Companies are compiling your smartphone data into shockingly intimate profiles that can be used against you.
Storing data in the cloud is convenient, but how secure is it? And what are users' options for stepping up their data security?
Australians can see the impact of dockless bike sharing on the streets of their cities. The huge store of data collected about user journeys is less visible, but just as important.
Like legitimate e-commerce, ransomware e-crime is increasing in scale, value and sophistication.
With the right approach to data security, scientists' discoveries of the locations of rare and sought-after species needn't leave a trail for poachers to follow.
UK politicians are planning very different approaches to data privacy, security and surveillance.