Government privacy commissioners are investigating a data breach at one of Canada’s largest medical services companies, after hackers gained access to the personal information of 15 million customers.
As our worlds are become increasingly digitised, we’re starting to rely more on machines and devices for everyday tasks. But in an age when even pacemakers can be hacked, how do we know when and who to trust?
SHUTTERSTOCK
Research shows we’re pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Are military drones a security threat to their own operators?
Gorodenkoff/Shutterstock
Drones are now an integral part of defence force capability, from intelligence gathering to unmanned theatre engagement. But what happens if our own technology is turned against us?
A spider’s web is secure, and ours?
Robert Anasch/Unsplash
The announcement of a systemic attack on the Internet in February 2019 raises the question of the structure and protection of one of the major protocols of the web: the domain name service (DNS).
Don’t wait - update your phone’s software.
Franck Robichon/AAP Image
The news that malware can invade iPhones and other Apple devices via the Safari web browser has damaged Apple’s reputation for security. But you can fix the problem by updating your phone’s software.
Digital attacks can cause havoc in different places all at the same time.
Pushish Images/Shutterstock.com
Nuclear threats are serious – but officials, the media and the public keep a close eye on them. There’s less attention to the dangers of cyberattacks, which could cripple key utilities.
Power grids are high priority targets during conflict.
Shutterstock
US and Russian tension over power grid cyber attacks is a concern for global stability, but it also highlights our own critical infrastructure vulnerabilities.
It’s been reported that names, addresses, dates of birth, phone numbers, personal email addresses and emergency contact details, tax file numbers, payroll information, bank account details, passport details and student academic records were accessed.
www.shutterstock.com
Julian Assange’s indictment under the Espionage Act, a sweeping law with heavy penalties for unauthorized receiving or disclosing of classified information, poses a threat to press freedom.
WhatsApp says more than 1 billion use the app.
Shutterstock/XanderS
Current techniques to protect biometric details, such as face recognition or fingerprints, from hacking are effective, but advances in AI are rendering these protections obsolete.
No method is perfect, but physical security keys are a reliable form of multi-factor authentication.
Shutterstock
The danger with car hacking isn’t terrorists taking control of your car (as movies might have you think), but the age old problem of dodgy mechanics getting you to spend more on servicing it.
Sunanda Creagh, The Conversation; Wes Mountain, The Conversation, and Bageshri Savyasachi, The Conversation
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation38.8 MB(download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Your voting preference might be subtly influenced by social media exposure in the lead up to an election.
Ellen Smith/AAP
If another country wants to weaponise data hacked through Australia’s parliament, we’ll likely see them try to inflame religious and ethnic differences, and drive votes to minor parties.
States that come under cyber attack from state actors have few good legal remedies available to them.
Shutterstock
Cyber attacks are a real and increasing threat to Australia, and the law lags a long way behind in both protection and recourse.
Prime Minister Morrison said there was no evidence of electoral interference linked to a hack of the Australian Parliament House computer network.
from www.shutterstock.com
When you click on unverified links or download suspicious apps you increase the risk of exposure to malware. Here’s what could happen if you do – and how you can minimise your risk.