Ransomware gangs are running riot – paying them off doesn’t help

Last Updated on 20 October 2022 by Daniel Jan Lemnitzer, Copenhagen Business School In the past five years, ransomware attacks have evolved from rare misfortunes into common and disruptive threats. Hijacking the IT systems of organisations and forcing them to pay a ransom in order to reclaim them, cybercriminals are freely extorting millions of pounds… Continue reading Ransomware gangs are running riot – paying them off doesn’t help

After the Optus data breach, Australia needs mandatory disclosure laws

Last Updated on 19 October 2022 by Daniel Jane Andrew, University of Sydney; Max Baker, University of Sydney, and Monique Sheehan, University of Sydney The Optus data breach, which has affected close to 10 million Australians, has sparked calls for changes to Australia’s privacy laws, placing limits on what and for how long organisations can… Continue reading After the Optus data breach, Australia needs mandatory disclosure laws

RMIT attack underlines need to train all uni staff in cyber safety

Last Updated on 18 October 2022 by Daniel Abu Barkat ullah, University of Canberra and Mohiuddin Ahmed, Edith Cowan University Cyber criminals are very persistent and the daily numbers of cyber attacks show no sign of decreasing. The latest reported attack on an Australian university has disrupted the start of the semester at RMIT. The… Continue reading RMIT attack underlines need to train all uni staff in cyber safety

FamilySearch Account Email

Last Updated on 17 October 2022 by Daniel Just received the following email from FamilySearch (https://www.familysearch.org/en/). Funny thing is that I do not recall signing up on that website. Not saying I didn’t, probably just slipped my mind. Anyways, email follows: Important information about your FamilySearch AccountEngagement No. B058763 Dear Account Holder: FamilySearch International, a… Continue reading FamilySearch Account Email

Security flaws in Microsoft email software raise questions over Australia’s cybersecurity approach

Last Updated on 16 October 2022 by Daniel Carsten Rudolph, Monash University On March 2, 2021, Microsoft published information about four critical vulnerabilities in its widely used Exchange email server software that are being actively exploited. It also released security updates for all versions of Exchange back to 2010. Microsoft has told cybersecurity expert Brian… Continue reading Security flaws in Microsoft email software raise questions over Australia’s cybersecurity approach

Facebook data breach: what happened and why it’s hard to know if your data was leaked

Last Updated on 15 October 2022 by Daniel Paul Haskell-Dowland, Edith Cowan University Over the long weekend reports emerged of an alleged data breach, impacting half a billion Facebook users from 106 countries. And while this figure is staggering, there’s more to the story than 533 million sets of data. This breach once again highlights… Continue reading Facebook data breach: what happened and why it’s hard to know if your data was leaked

The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Last Updated on 14 October 2022 by Daniel Scott Shackelford, Indiana University The FBI has the authority right now to access privately owned computers without their owners’ knowledge or consent, and to delete software. It’s part of a government effort to contain the continuing attacks on corporate networks running Microsoft Exchange software, and it’s an… Continue reading The FBI is breaking into corporate computers to remove malicious code – smart cyber defense or government overreach?

Four ways to make sure your passwords are safe and easy to remember

Last Updated on 13 October 2022 by Daniel Steven Furnell, University of Nottingham For more than 15 years, there have been various predictions from tech leaders about the death of passwords. Bill Gates predicted it back in 2004 and Microsoft has predicted it for 2021. There have been numerous similar proclamations in between, alongside ongoing… Continue reading Four ways to make sure your passwords are safe and easy to remember

Boris Johnson’s phone: what can hackers do with your mobile number?

Last Updated on 12 October 2022 by Daniel Edward Apeh, Bournemouth University Boris Johnson’s personal phone number has been publicly available on the internet for 15 years, it has been revealed. Listed at the bottom of a 2006 press release, the number has reportedly been accessible online from the time the prime minister was shadow… Continue reading Boris Johnson’s phone: what can hackers do with your mobile number?

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem

Last Updated on 11 October 2022 by Daniel Terry Thompson, Johns Hopkins University Takeaways: · There are no easy solutions to shoring up U.S. national cyber defenses. · Software supply chains and private sector infrastructure companies are vulnerable to hackers. · Many U.S. companies outsource software development because of a talent shortage, and some of… Continue reading The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem