Email scams are getting more personal – they even fool cybersecurity experts

Gareth Norris, Aberystwyth University; Max Eiza, Liverpool John Moores University, and Oli Buckley, University of East Anglia We all like to think we’re immune to scams. We scoff at emails from an unknown sender offering us £2 million, in exchange for our bank details. But the game has changed and con artists have developed new,… Continue reading Email scams are getting more personal – they even fool cybersecurity experts

What are the types of Multi-Factor Authentication?

Multi-Factor Authentication (MFA) enhances security by requiring users to provide multiple forms of authentication before granting access to an account or system. There are several types of MFA methods, each offering different layers of security. Some common types of MFA include: Something You Know (Knowledge): Password: This is the most common form of authentication. Users… Continue reading What are the types of Multi-Factor Authentication?

What are the methods to secure website authentication?

Securing website authentication is critical for protecting user accounts and sensitive data. There are several methods and best practices to enhance website authentication security: Remember that security is an ongoing process. Keep your systems and practices up to date with the latest security standards and adapt to emerging threats to maintain strong website authentication security.

Governments and hackers agree: the laws of war must apply in cyberspace

Johanna Weaver, Australian National University There are rules in war. International humanitarian law regulates what combatants can and can’t do, with the goal of protecting civilians and limiting suffering. Most of these laws were developed during the 19th and 20th centuries. But in our own century a new kind of battlefield has emerged: the domain… Continue reading Governments and hackers agree: the laws of war must apply in cyberspace

Published
Categorised as Hacking

The 23andMe data breach reveals the vulnerabilities of our interconnected data

Ignacio Cofone, McGill University On Oct. 6, news broke that 23andMe, the genomics company that collects genetic material from thousands of people for ancestry and genetic predisposition tests, had a massive data breach. But as it turns out, the company’s servers were not hacked. Rather, hackers targeted hundreds of individual user accounts — allegedly those… Continue reading The 23andMe data breach reveals the vulnerabilities of our interconnected data

Microsoft’s takeover would be a win for TikTok and tech giants – not users

Paul Haskell-Dowland, Edith Cowan University and Brianna O’Shea, Edith Cowan University In what seems to be a common occurrence, Chinese video-sharing app TikTok is once again in the headlines. After months of speculation about national security risks and users’ data being harvested by the Chinese Communist Party, US President Donald Trump has announced plans to… Continue reading Microsoft’s takeover would be a win for TikTok and tech giants – not users

With the increase in remote work, businesses need to protect themselves against cyberattacks

Michael Parent, Simon Fraser University The COVID-19 pandemic and subsequent lockdown have forever changed how we socialize and conduct business. More and more, our personal and professional lives will be online. Paradoxically, our office towers sit empty. However, the amount of traffic in the virtual world continues to increase exponentially. Our physical borders are closed,… Continue reading With the increase in remote work, businesses need to protect themselves against cyberattacks

Published
Categorised as Other

How a hacker could hijack a plane from their seat

Yijun Yu, The Open University and Andrew Smith, The Open University Reports that a cybersecurity expert successfully hacked into an aeroplane’s control system from a passenger seat raises many worrying questions for the airline industry. It was once believed that the cockpit network that allows the pilot to control the plane was fully insulated and… Continue reading How a hacker could hijack a plane from their seat

Which type phones are more easily and typically exploited?

The ease of exploiting a phone can depend on various factors, including the type of phone, the operating system it runs, and the user’s behavior. Here are some general considerations regarding phone security: It’s important to note that both Android and iOS devices can be secure when properly configured and used with good security practices.… Continue reading Which type phones are more easily and typically exploited?