If you're reluctant to share your password, or broadcast a team password in Slack in a groupchat, your instincts are correct. But mocking those who 'do the wrong thing' is unlikely to help.
Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
There has been a dramatic spike in identity theft and online shopping scams this year as fraudsters try to take advantage of people's vulnerability during uncertain times.
With so many people working from home on vulnerable networks and set-ups, cybersecurity is a growing concern.
Emails offering advice about COVID-19 might actually be "phishing" attacks trying to steal your data.
Beware the #WorkFromHome selfie.
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
Remember when websites didn't rely on user data for profit margins, when values like anonymity and transparency were celebrated?
A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
Research shows we're pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next.
The Conversation38.8 MB (download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Almost every online deception, fraud and scam – even propaganda and misinformation campaigns – begins with a fake social media profile. How do fakers get real people to agree to be friends?
Australians have lost more than $76 million to fraud so far this year. These are the tactics that online offenders use to dupe their victims.
It's impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It's time to return to plain, text-only email.
Cyber Security Summer School is a chance for researchers to test their skills during live penetration testing.
To protect ourselves online, we should all understand a few key terms.
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
You know it's a serious problem when even Google and Paypal have been targeted.
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.