Are social media apps ‘dangerous products’? 2 scholars explain how the companies rely on young users but fail to protect them

Joan Donovan, Boston University and Sara Parker, McGill University “You have blood on your hands.” “I’m sorry for everything you have all been through.” These quotes, the first from Sen. Lindsey Graham, R-S.C., speaking to Meta CEO Mark Zuckerberg, and the second from Zuckerberg to families of victims of online child abuse in the audience,… Continue reading Are social media apps ‘dangerous products’? 2 scholars explain how the companies rely on young users but fail to protect them

Your smart watch isn’t a medical device – but it is tracking all your health data

Pin Lean Lau, Brunel University London For millions of people, smartwatches aren’t just a piece of technology. They can use them to take control of their health in ways never thought possible. As you go on your morning run, a smartwatch can monitor the rhythmic pounding of your feet and your heart’s steady beat. The… Continue reading Your smart watch isn’t a medical device – but it is tracking all your health data

Should you be checking your kid’s phone? How to know when your child is ready for ‘phone privacy’

Joanne Orlando, Western Sydney University Smartphone ownership among younger children is increasing rapidly. Many primary school children now own smartphones and they have become the norm in high school. Parents of younger children may occasionally (or routinely) look at their child’s phone to check it’s being used responsibly and safely. But as children mature into… Continue reading Should you be checking your kid’s phone? How to know when your child is ready for ‘phone privacy’

To protect user privacy online, governments need to reconsider their use of opt-in policies

Raymond A. Patterson, University of Calgary; Hooman Hidaji, University of Calgary; Niam Yaraghi, University of Miami; Ram Gopal, Warwick Business School, University of Warwick, and Sule Nur Kutlu, University of Calgary Internet users — almost all of us — are growing used to seeing requests for consent to gather our information: “Do you accept cookies… Continue reading To protect user privacy online, governments need to reconsider their use of opt-in policies

So, you’ve been scammed by a deepfake. What can you do?

Jeannie Marie Paterson, The University of Melbourne Earlier this month, a Hong Kong company lost HK$200 million (A$40 million) in a deepfake scam. An employee transferred funds following a video conference call with scammers who looked and sounded like senior company officials. Generative AI tools can create image, video and voice replicas of real people… Continue reading So, you’ve been scammed by a deepfake. What can you do?

Is Australia’s electricity grid vulnerable to the kind of cyber attacks taking place between Russia and the US?

Andrew Dowse, Edith Cowan University and Mike Johnstone, Edith Cowan University The New York Times reported earlier this month that the United States was increasing its cyber attacks on Russia’s power grid. The attacks are seen as a warning against Russian intrusions into US systems, but one that carries a risk of escalation. The public… Continue reading Is Australia’s electricity grid vulnerable to the kind of cyber attacks taking place between Russia and the US?

In the web’s hidden darknet, criminal enterprise is thriving

Daniel Prince, Lancaster University Criminals have always done their best to use new technology to their advantage and the rapid development of new digital technologies and online markets has provided the criminal entrepreneur with as much opportunity for innovation as their legitimate counterpart. Europol’s recent Internet Organised Crime Threat Assessment (iOCTA) report spells this out… Continue reading In the web’s hidden darknet, criminal enterprise is thriving

Deepfakes in South Africa: protecting your image online is the key to fighting them

Layckan Van Gensen, Stellenbosch University Leanne Manas is a familiar face on South African televisions. Towards the end of 2023 the morning news presenter’s face showed up somewhere else: in bogus news stories and fake advertisements in which “she” appeared to promote various products or get-rich-quick schemes. It quickly emerged that Manas had fallen victim… Continue reading Deepfakes in South Africa: protecting your image online is the key to fighting them

What ‘psychological warfare’ tactics do scammers use, and how can you protect yourself?

Mike Johnstone, Edith Cowan University and Georgia Psaroulis, Edith Cowan University Not a day goes by without a headline about a victim being scammed and losing money. We are constantly warned about new scams and staying safe from cybercriminals. Scamwatch has no shortage of resources, too. So why are people still getting scammed, and sometimes… Continue reading What ‘psychological warfare’ tactics do scammers use, and how can you protect yourself?

Cybersecurity for satellites is a growing challenge, as threats to space-based infrastructure grow

Sylvester Kaczmarek, Imperial College London In today’s interconnected world, space technology forms the backbone of our global communication, navigation and security systems. Satellites orbiting Earth are pivotal for everything from GPS navigation to international banking transactions, making them indispensable assets in our daily lives and in global infrastructure. However, as our dependency on these celestial… Continue reading Cybersecurity for satellites is a growing challenge, as threats to space-based infrastructure grow