Using truly secure passwords: 6 essential reads

Last Updated on 2 October 2023 by Daniel Jeff Inglis, The Conversation Editor’s note: the following is roundup of previously published articles. Passwords are everywhere – and they present an impossible puzzle. Social media profiles, financial records, personal correspondence and vital work documents are all protected by passwords. To keep all that information safe, the… Continue reading Using truly secure passwords: 6 essential reads

What are good website security practices?

Last Updated on 30 September 2023 by Daniel Good website security practices are crucial for protecting your website and its data from various threats, including hackers, malware, and other cyberattacks. Here are some essential website security practices you should implement: Website security is an ongoing process, and it’s essential to stay vigilant and proactive in… Continue reading What are good website security practices?

What should you look out for in phone text messages to protect yourself?

Last Updated on 29 September 2023 by Daniel Protecting yourself in phone text messages is essential, as scams and phishing attempts often target individuals through text messaging. Here are some things to look out for: Protecting yourself from text message scams and phishing attempts requires vigilance and caution. Always think twice before taking action on… Continue reading What should you look out for in phone text messages to protect yourself?

How do hackers spoof IP addresses?

Last Updated on 28 September 2023 by Daniel Spoofing IP addresses is a technique used by hackers to disguise their true identity and location on the internet. It involves sending network packets with a forged source IP address, making it appear as though the data originated from a different machine or location. This can be… Continue reading How do hackers spoof IP addresses?

Remote workers are more aware of cybersecurity risks than in-office employees: new study

Last Updated on 27 September 2023 by Daniel Joseph K. Nwankpa, Miami University and Pratim Milton Datta, Kent State University Workers who telecommute tend to be more aware of cybersecurity threats than those who spend most of their time in a physical office and are more likely to take action to ward them off, according… Continue reading Remote workers are more aware of cybersecurity risks than in-office employees: new study

A national digital ID scheme is being proposed. An expert weighs the pros and (many more) cons

Last Updated on 26 September 2023 by Daniel Erica Mealy, University of the Sunshine Coast In 2018-19, identity crime directly and indirectly cost Australia an estimated A$3.1 billion. To address such costs, the federal government is proposing a national digital identity scheme that will let people prove their identity without having to share documents such as… Continue reading A national digital ID scheme is being proposed. An expert weighs the pros and (many more) cons

Can hackers user AI for hacking?

Yes, hackers can use AI (Artificial Intelligence) for hacking, and the use of AI in cyberattacks is a growing concern in the cybersecurity community. AI can be employed by hackers to automate and enhance various aspects of their attacks. Here are some ways in which hackers can use AI for hacking: To counter these AI-driven… Continue reading Can hackers user AI for hacking?

Spyware can infect your phone or computer via the ads you see online – report

Last Updated on 22 September 2023 by Daniel Claire Seungeun Lee, UMass Lowell Each day, you leave digital traces of what you did, where you went, who you communicated with, what you bought, what you’re thinking of buying, and much more. This mass of data serves as a library of clues for personalized ads, which… Continue reading Spyware can infect your phone or computer via the ads you see online – report

How can I scan web server for security intrusions like root kits and virus?

Last Updated on 21 September 2023 by Daniel Scanning a web server for security intrusions, including rootkits and viruses, is an essential part of maintaining a secure environment. Here are steps you can take to scan your web server for potential security threats: Remember that security is an ongoing process. Regularly monitoring and scanning your… Continue reading How can I scan web server for security intrusions like root kits and virus?

What are the biggest security threats to a web application, and how can I harden?

Web applications are susceptible to various security threats. To harden your web application’s security, you should be aware of these threats and take appropriate measures to mitigate them. Here are some of the biggest security threats and steps to harden your web application: To harden your web application, conduct regular security assessments, such as penetration… Continue reading What are the biggest security threats to a web application, and how can I harden?