Can PDF files be hacked? If so, how can you mitigate?

Last Updated on 4 October 2023 by Daniel PDF files themselves cannot be “hacked” in the sense of being directly compromised. PDF is a file format, and like any other file format, it’s not inherently vulnerable to hacking. However, PDF files can be manipulated, exploited, or used as a vector for various types of cyberattacks.… Continue reading Can PDF files be hacked? If so, how can you mitigate?

Using truly secure passwords: 6 essential reads

Last Updated on 2 October 2023 by Daniel Jeff Inglis, The Conversation Editor’s note: the following is roundup of previously published articles. Passwords are everywhere – and they present an impossible puzzle. Social media profiles, financial records, personal correspondence and vital work documents are all protected by passwords. To keep all that information safe, the… Continue reading Using truly secure passwords: 6 essential reads

What are good website security practices?

Last Updated on 30 September 2023 by Daniel Good website security practices are crucial for protecting your website and its data from various threats, including hackers, malware, and other cyberattacks. Here are some essential website security practices you should implement: Website security is an ongoing process, and it’s essential to stay vigilant and proactive in… Continue reading What are good website security practices?

What should you look out for in phone text messages to protect yourself?

Last Updated on 29 September 2023 by Daniel Protecting yourself in phone text messages is essential, as scams and phishing attempts often target individuals through text messaging. Here are some things to look out for: Protecting yourself from text message scams and phishing attempts requires vigilance and caution. Always think twice before taking action on… Continue reading What should you look out for in phone text messages to protect yourself?

How do hackers spoof IP addresses?

Last Updated on 28 September 2023 by Daniel Spoofing IP addresses is a technique used by hackers to disguise their true identity and location on the internet. It involves sending network packets with a forged source IP address, making it appear as though the data originated from a different machine or location. This can be… Continue reading How do hackers spoof IP addresses?

Remote workers are more aware of cybersecurity risks than in-office employees: new study

Last Updated on 27 September 2023 by Daniel Joseph K. Nwankpa, Miami University and Pratim Milton Datta, Kent State University Workers who telecommute tend to be more aware of cybersecurity threats than those who spend most of their time in a physical office and are more likely to take action to ward them off, according… Continue reading Remote workers are more aware of cybersecurity risks than in-office employees: new study

A national digital ID scheme is being proposed. An expert weighs the pros and (many more) cons

Last Updated on 26 September 2023 by Daniel Erica Mealy, University of the Sunshine Coast In 2018-19, identity crime directly and indirectly cost Australia an estimated A$3.1 billion. To address such costs, the federal government is proposing a national digital identity scheme that will let people prove their identity without having to share documents such as… Continue reading A national digital ID scheme is being proposed. An expert weighs the pros and (many more) cons

Fyre Festival II: a psychologist on why some people fall for fraudsters over and over again

Last Updated on 25 September 2023 by Daniel Yaniv Hanoch, University of Southampton If you’ve ever been scammed, perhaps you resolved to never allow someone to take you for a fool again. But research shows not everyone reacts this way and in fact some fraud victims go into denial. This might help explain why the… Continue reading Fyre Festival II: a psychologist on why some people fall for fraudsters over and over again