Many people don’t want to let go of how they create passwords.
When it comes to picking a new password, people's resistance to change can make them less secure online.
A link is a mechanism for data to be delivered to your device.
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here's what could happen if you do – and how you can minimise your risk.
If they cannot be completely prevented, detecting computer attacks as early as possible helps to limit their costs.
The cost of computer attacks to companies is difficult to quantify precisely. One thing is certain, however: it is constantly improving. As is the case with defensive measures...
True love could be hiding inside mounds of data.
Trying to optimize the search for love can be naive. Using statistics and measurements isn't necessarily the best way to find a human partner.
They’re small and well-connected, but how safe are ‘internet of things’ devices?
As the number of 'internet of things' devices expands rapidly, so do security vulnerabilities to homes, businesses, governments and the internet as as whole.
The German government held a press conference in Berlin on January 4 about a hack which targeted German politicians.
German MPs were outraged they weren't notified they were targets in a cyber attack, which resulted in the public release of mobile phone numbers and credit card information.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
Emmanuel Macron called for support for “open, secure, stable, accessible and peaceful cyberspace”.
The French president's Paris Call is for international collaboration to make the Internet safer. What are the advances and limitations of this text?
Do people need insurance against hacking?
As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
Minuscule computer hardware could be spying on top tech firms.
We've no way of knowing if allegations that China implanted secret spying microchips in widely used computers are true.
There are several flow-on effects from the recent Facebook hack.
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
BA's handling of the latest corporate cyber attack shows a catalogue of missed opportunities.
Researchers used a fax machine that wasn't even connected to the internet to break into a computer network.
A serious security threat was found in popular video game Fortnite's installation method after it bypassed Google's official app store.
Australia has one of the most secure electoral systems imaginable thanks to paper ballots. Cybersecurity experts caution against e-voting.
Malicious and criminal attacks were the cause of 59% of data breaches in the last three months, according the latest reported figures.
Who’s in control of what’s flowing in these wires?
D Sharon Pruitt
Experts explain the task of securing the electrical grid against cyberattacks, and discuss potential solutions and the risk of failure.
Cybersecurity is an increasingly relevant concern in our society, but pop culture tells us virtually nothing useful about it.
The Australian National University has been working with intelligence agencies to minimise the impact of a cyber attack on its systems.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys.
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here's how you can protect yourself.