One of a hacker’s most valuable tools is the phishing attack, and you might be unwittingly making the hacker’s job easier by leaving useful information about you online.
QR codes are visual patterns that store data smartphones can read.
AP Photo/Vincent Yu
Data breaches have become a fact of life. Here are articles from The Conversation that detail the threat, why it happens and what you can do to protect yourself.
If your gut says something is off about an email message, stop and investigate.
Jose Luis Pelaez Inc/DigitalVision via Getty Images
Weirdness is a clue about fraudulent email messages. But it takes more than a sense that something’s wrong to get people to investigate.
Our critical infrastructures are growing increasingly complex as the number of devices and connections in these systems continues to grow.
(Shutterstock)
If you’re reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who ‘do the wrong thing’ is unlikely to help.
North Korea has a long history of hacking targets in the U.S.
Chris Price/Flickr
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
There has been a dramatic spike in identity theft and online shopping scams this year as fraudsters try to take advantage of people’s vulnerability during uncertain times.
Shelter-in-place directives mean that more and more people are working remotely from home, producing more technological vulnerabilities.
(Mimi Thian/Unsplash)
Laura DeNardis, American University School of Communication
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
For years, Craigslist operated out of an old Victorian house in San Francisco, before moving out in 2010.
Justin Sullivan/Getty Images
A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
As our worlds are become increasingly digitised, we’re starting to rely more on machines and devices for everyday tasks. But in an age when even pacemakers can be hacked, how do we know when and who to trust?
SHUTTERSTOCK
Research shows we’re pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Sunanda Creagh, The Conversation; Wes Mountain, The Conversation, and Bageshri Savyasachi, The Conversation
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation38.8 MB(download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.