Gareth Norris, Aberystwyth University; Max Eiza, Liverpool John Moores University, and Oli Buckley, University of East Anglia We all like to think we’re immune to scams. We scoff at emails from an unknown sender offering us £2 million, in exchange for our bank details. But the game has changed and con artists have developed new,… Continue reading Email scams are getting more personal – they even fool cybersecurity experts
Multi-Factor Authentication (MFA) enhances security by requiring users to provide multiple forms of authentication before granting access to an account or system. There are several types of MFA methods, each offering different layers of security. Some common types of MFA include: Something You Know (Knowledge): Password: This is the most common form of authentication. Users… Continue reading What are the types of Multi-Factor Authentication?
Securing website authentication is critical for protecting user accounts and sensitive data. There are several methods and best practices to enhance website authentication security: Remember that security is an ongoing process. Keep your systems and practices up to date with the latest security standards and adapt to emerging threats to maintain strong website authentication security.
Johanna Weaver, Australian National University There are rules in war. International humanitarian law regulates what combatants can and can’t do, with the goal of protecting civilians and limiting suffering. Most of these laws were developed during the 19th and 20th centuries. But in our own century a new kind of battlefield has emerged: the domain… Continue reading Governments and hackers agree: the laws of war must apply in cyberspace
Ignacio Cofone, McGill University On Oct. 6, news broke that 23andMe, the genomics company that collects genetic material from thousands of people for ancestry and genetic predisposition tests, had a massive data breach. But as it turns out, the company’s servers were not hacked. Rather, hackers targeted hundreds of individual user accounts — allegedly those… Continue reading The 23andMe data breach reveals the vulnerabilities of our interconnected data
There have been many bizarre and unusual hacks over the years. Here are a few of the weirdest and most notable examples: These examples highlight the diverse range of devices and systems that have been hacked over the years. It’s a reminder that in our increasingly interconnected world, even the most unexpected devices can be… Continue reading What are the weirdest things hacked?
Paul Haskell-Dowland, Edith Cowan University and Brianna O’Shea, Edith Cowan University In what seems to be a common occurrence, Chinese video-sharing app TikTok is once again in the headlines. After months of speculation about national security risks and users’ data being harvested by the Chinese Communist Party, US President Donald Trump has announced plans to… Continue reading Microsoft’s takeover would be a win for TikTok and tech giants – not users
Michael Parent, Simon Fraser University The COVID-19 pandemic and subsequent lockdown have forever changed how we socialize and conduct business. More and more, our personal and professional lives will be online. Paradoxically, our office towers sit empty. However, the amount of traffic in the virtual world continues to increase exponentially. Our physical borders are closed,… Continue reading With the increase in remote work, businesses need to protect themselves against cyberattacks
Yijun Yu, The Open University and Andrew Smith, The Open University Reports that a cybersecurity expert successfully hacked into an aeroplane’s control system from a passenger seat raises many worrying questions for the airline industry. It was once believed that the cockpit network that allows the pilot to control the plane was fully insulated and… Continue reading How a hacker could hijack a plane from their seat
The ease of exploiting a phone can depend on various factors, including the type of phone, the operating system it runs, and the user’s behavior. Here are some general considerations regarding phone security: It’s important to note that both Android and iOS devices can be secure when properly configured and used with good security practices.… Continue reading Which type phones are more easily and typically exploited?