Which day of the year most prone to cyber-attacks?

There isn’t a specific day of the year that is universally known as the most prone to cyber-attacks. Cyber-attacks can occur at any time, and their frequency and intensity often depend on various factors, including geopolitical events, software vulnerabilities, and evolving cyber threats. However, some patterns suggest that cyber-attacks may increase during significant events or… Continue reading Which day of the year most prone to cyber-attacks?

What is difference between dictionary attacks and brute force attacks?

Dictionary attacks and brute force attacks are both types of password attacks, but they differ in their approach and methods: In summary, while brute force attacks systematically try all possible combinations, dictionary attacks rely on a predefined list of words. Both methods aim to discover passwords through automated and systematic means, but their efficiency and… Continue reading What is difference between dictionary attacks and brute force attacks?

Trolling and doxxing: Graduate students sharing their research online speak out about hate

Alex Borkowski, York University, Canada; Marion Tempest Grant, York University, Canada, and Natalie Coulter, York University, Canada https://narrations.ad-auris.com/widget/the-conversation-canada/trolling-and-doxxing-graduate-students-sharing-their-research-online-speak-out-about-hate An increasingly volatile online environment is affecting our society, including members of the academic community and research they pursue. Graduate students are especially vulnerable to online hate, because cultivating a visible social media presence is considered essential… Continue reading Trolling and doxxing: Graduate students sharing their research online speak out about hate

Smart devices spy on you – 2 computer scientists explain how the Internet of Things can violate your privacy

Roberto Yus, University of Maryland, Baltimore County and Primal Pappachan, Penn State Have you ever felt a creeping sensation that someone’s watching you? Then you turn around and you don’t see anything out of the ordinary. Depending on where you were, though, you might not have been completely imagining it. There are billions of things… Continue reading Smart devices spy on you – 2 computer scientists explain how the Internet of Things can violate your privacy

Google Chrome just rolled out a new way to track you and serve ads. Here’s what you need to know

Erica Mealy, University of the Sunshine Coast Late last week, Google announced something called the Privacy Sandbox has been rolled out to a “majority” of Chrome users, and will reach 100% of users in the coming months. But what is it, exactly? The new suite of features represents a fundamental shift in how Chrome will… Continue reading Google Chrome just rolled out a new way to track you and serve ads. Here’s what you need to know

Published
Categorised as Privacy

Phone hacking in the British press: three key moments in the scandal – and what happens next

John Jewell, Cardiff University Prince Harry has emerged as the victor in his civil case against Mirror Group Newspapers. The judge, Mr Justice Fanning, ruled that on the balance of probabilities a sample of 15 out of 33 articles examined by his court were written as result of phone hacking and other illegal measures. In… Continue reading Phone hacking in the British press: three key moments in the scandal – and what happens next

How an app to decrypt criminal messages was born ‘over a few beers’ with the FBI

David Tuffley, Griffith University Australian and US law enforcement officials on Tuesday announced they’d sprung a trap three years in the making, catching major international crime figures using an encrypted app. More than 200 underworld figures in Australia have been charged in what Australian Federal Police (AFP) say is their biggest-ever organised crime bust. The… Continue reading How an app to decrypt criminal messages was born ‘over a few beers’ with the FBI

Crypto theft is on the rise. Here’s how the crimes are committed, and how you can protect yourself

Aaron M. Lane, RMIT University News emerged overnight of the potential theft of more than US$326 million (A$457.7 million) of Ethereum tokens from a blockchain bridge (which connects two blockchains so cryptocurrency can be exchanged between them). It’s no surprise. Crypto crime has been on the rise – especially since the pandemic began. How are… Continue reading Crypto theft is on the rise. Here’s how the crimes are committed, and how you can protect yourself

What are the best practices for securing an API against brute force attacks?

Securing an API against brute force attacks is crucial to prevent unauthorized access and protect sensitive information. Here are some best practices to enhance the security of your API against brute force attacks: By incorporating these best practices, you can significantly enhance the security of your API and reduce the risk of successful brute force… Continue reading What are the best practices for securing an API against brute force attacks?

Published
Categorised as API

A year of ChatGPT: 5 ways the AI marvel has changed the world

Toby Walsh, UNSW Sydney OpenAI’s artificial intelligence (AI) chatbot ChatGPT was unleashed onto an unsuspecting public exactly one year ago. It quickly became the fastest-growing app ever, in the hands of 100 million users by the end of the second month. Today, it’s available to more than a billion people via Microsoft’s Bing search, Skype… Continue reading A year of ChatGPT: 5 ways the AI marvel has changed the world