Sophisticated fake social media personas created by North Korean hackers offered to collaborate with cybersecurity researchers. Several US researchers fell for it.
There has been a dramatic spike in identity theft and online shopping scams this year as fraudsters try to take advantage of people’s vulnerability during uncertain times.
Shelter-in-place directives mean that more and more people are working remotely from home, producing more technological vulnerabilities.
(Mimi Thian/Unsplash)
Laura DeNardis, American University School of Communication
Co-opting internet-connected devices could disrupt transportation systems on Election Day, stymie political campaigns, or help make information warfare more credible.
For years, Craigslist operated out of an old Victorian house in San Francisco, before moving out in 2010.
Justin Sullivan/Getty Images
A recent leakware attack targeting Johannesburg was the second of its kind ever recorded. Hackers demanded A$52,663 worth of bitcoins, in return for not releasing senstivie civilian information.
As our worlds are become increasingly digitised, we’re starting to rely more on machines and devices for everyday tasks. But in an age when even pacemakers can be hacked, how do we know when and who to trust?
SHUTTERSTOCK
Research shows we’re pretty gullible as it is. And our increasing reliance on machines for completing everyday tasks makes us all-the-more vulnerable to being exploited.
Sunanda Creagh, The Conversation; Wes Mountain, The Conversation, and Bageshri Savyasachi, The Conversation
‘I think we should be very concerned’: A cybercrime expert on this week’s hack and what needs to happen next
The Conversation38.8 MB(download)
This week, a 'sophisticated state actor' hacked the big Australian political parties. In today's episode, an expert on crime and technology says 'it's a given' that some will try to disrupt elections.
Do you want to be friends with this person?
Sasun Bughdaryan
Almost every online deception, fraud and scam – even propaganda and misinformation campaigns – begins with a fake social media profile. How do fakers get real people to agree to be friends?
Fraudsters use specific social engineering tactics to gain the trust of their victims.
Shutterstock
It’s impossible to be certain of safety while using Gmail, Yahoo mail and other web-based email systems. The best solution is a radical one: It’s time to return to plain, text-only email.
Students infiltrate a host computer under the watchful eye of a mentor during a capture the flag exercise.
Richard Matthews
Nearly half of cybercriminals target small businesses. An expert explains how sole proprietors and entrepreneurs can boost cybersecurity without breaking the bank.
Phishing for information and money.
shutterstock.com
Kenya recently expressed fear that Al-Shabaab could interfere with the electronic voting system during the upcoming general election. Are cyber attacks a real threat in Africa?
Not this kind of spearfishing – the kind that involves a computer.
Underwater image via shutterstock.com
Despite years of public information efforts, even simple cyberattacks still succeed. Here are five steps to avoiding having your emails appear on WikiLeaks.
Internet scamming is proving to be an attractive career to a considerable number of Nigerian students.
Shutterstock