Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be?

Last Updated on 28 September 2022 by Daniel Merrill Warkentin, Mississippi State University The headlines are filled with news about ransomware attacks tying up organizations large and small, data breaches at major brand-name companies and cyberattacks by shadowy hackers associated with Russia, China and North Korea. Are these threats to your personal information? If it’s… Continue reading Ransomware, data breach, cyberattack: What do they have to do with your personal information, and how worried should you be?

Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 years

Last Updated on 27 September 2022 by Daniel Paul Haskell-Dowland, Edith Cowan University and Andrew Woodward, Edith Cowan University Australian organisations are a soft target for ransomware attacks, say experts who yesterday issued a fresh warning that the government needs to do more to stop agencies and businesses falling prey to cyber-crime. But in truth,… Continue reading Is Australia a sitting duck for ransomware attacks? Yes, and the danger has been growing for 30 years

What does the Optus data breach mean for you and how can you protect yourself? A step-by-step guide

Last Updated on 26 September 2022 by Daniel Jennifer J. Williams, Macquarie University; Jeffrey Foster, Macquarie University, and Tamara Watson, Western Sydney University Optus, Australia’s second largest telecommunications company, announced on September 22 that identifying details of up to 9.8 million customers were stolen from their customer database. The details, dating back to 2017, include… Continue reading What does the Optus data breach mean for you and how can you protect yourself? A step-by-step guide

As cyberattacks skyrocket, Canada needs to work with — and not hinder — cybersecurity experts

Last Updated on 25 September 2022 by Daniel Yuan Stevens, Toronto Metropolitan University and Stephanie Tran, Toronto Metropolitan University Cyberattacks are on the rise, impacting people, systems, infrastructures and governments with potentially devastating and far-reaching effects. Most recently, these include the massive REvil ransomware attack and the discovery that the Pegasus spyware was tracking more… Continue reading As cyberattacks skyrocket, Canada needs to work with — and not hinder — cybersecurity experts

How does the Pegasus spyware work, and is my phone at risk?

Last Updated on 24 September 2022 by Daniel Paul Haskell-Dowland, Edith Cowan University and Roberto Musotto, Edith Cowan University A major journalistic investigation has found evidence of malicious software being used by governments around the world, including allegations of spying on prominent individuals. From a list of more 50,000 phone numbers, journalists identified more than… Continue reading How does the Pegasus spyware work, and is my phone at risk?

Fight for control threatens to destabilize and fragment the internet

Last Updated on 23 September 2022 by Daniel Nick Merrill, University of California, Berkeley You try to use your credit card, but it doesn’t work. In fact, no one’s credit card works. You try to go to some news sites to find out why, but you can’t access any of those, either. Neither can anyone… Continue reading Fight for control threatens to destabilize and fragment the internet

The ‘privacy by design’ approach for mobile apps: why it’s not enough

Last Updated on 22 September 2022 by Daniel Dusty-Lee Donnelly, University of KwaZulu-Natal The mobile apps installed on our smartphones are one of the biggest threats to our digital privacy. They are capable of collecting vast amounts of personal data, often highly sensitive. The consent model on which privacy laws are based doesn’t work. App… Continue reading The ‘privacy by design’ approach for mobile apps: why it’s not enough

As cyberattacks skyrocket, Canada needs to work with — and not hinder — cybersecurity experts

Last Updated on 21 September 2022 by Daniel Yuan Stevens, Toronto Metropolitan University and Stephanie Tran, Toronto Metropolitan University Cyberattacks are on the rise, impacting people, systems, infrastructures and governments with potentially devastating and far-reaching effects. Most recently, these include the massive REvil ransomware attack and the discovery that the Pegasus spyware was tracking more… Continue reading As cyberattacks skyrocket, Canada needs to work with — and not hinder — cybersecurity experts

What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in

Last Updated on 20 September 2022 by Daniel Bhanukiran Gurijala, West Virginia University End-to-end encryption is technology that scrambles messages on your phone and unscrambles them only on the recipients’ phones, which means anyone who intercepts the messages in between can’t read them. Dropbox, Facebook, Google, Microsoft, Twitter and Yahoo are among the companies whose… Continue reading What is Pegasus? A cybersecurity expert explains how the spyware invades phones and what it does when it gets in

How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security

Last Updated on 19 September 2022 by Daniel Syed Wajid Ali Shah, Deakin University; Jongkil Jay Jeong, Deakin University, and Robin Doss, Deakin University It’s now well known that usernames and passwords aren’t enough to securely access online services. A recent study highlighted more than 80% of all hacking-related breaches happen due to compromised and… Continue reading How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security