Last Updated on 29 November 2023 by Daniel Greg Austin, University of Technology Sydney Should companies experiencing cyber attacks be forgiven if they cooperate with the government to stop such attacks? That’s the idea the federal government is considering with its possible “safe harbour” laws. Last week, the defence minister, Richard Marles, floated the idea… Continue reading Forgiveness or punishment? The government’s proposed ‘safe harbour’ laws send mixed messages on cyber security
Last Updated on 22 November 2023 by Daniel David Tuffley, Griffith University After lengthy deliberation, the Australian government has released its 2023–2030 Cyber Security Strategy, which aims to make Australia one of the most cyber-secure nations in the world by 2030. It’s a worthy goal, considering Australia was ranked as the fifth-most powerful cyber nation… Continue reading An expert reviews the government’s 7-year plan to boost Australia’s cyber security. Here are the key takeaways
Last Updated on 27 October 2023 by Daniel Ignacio Cofone, McGill University On Oct. 6, news broke that 23andMe, the genomics company that collects genetic material from thousands of people for ancestry and genetic predisposition tests, had a massive data breach. But as it turns out, the company’s servers were not hacked. Rather, hackers targeted… Continue reading The 23andMe data breach reveals the vulnerabilities of our interconnected data
Last Updated on 7 October 2023 by Daniel Richard Frank, Simon Fraser University LifeLabs — Canada’s major provider of lab diagnostics and testing services — announced on Dec. 17 that hackers had potentially accessed computer systems with data from “approximately 15 million customers” that “could include name, address, email, login, passwords, date of birth, health… Continue reading LifeLabs data breach: Hackers could still hold health records of 15M Canadians
Hackers conduct data breaches through a variety of methods and techniques. These breaches can target individuals, organizations, or even entire governments. Here’s an overview of how hackers typically conduct data breaches and what you can do to detect and prevent them: How Hackers Conduct Data Breaches: Detecting and Preventing Data Breaches: Preventing data breaches requires… Continue reading How do hackers conduct data breaches, and what can you do to detect and prevent?
There are several different types of encryption, each with its own strengths and weaknesses. The “best” type of encryption depends on the specific use case, security requirements, and the threat model. Here are some common types of encryption: As for which type of encryption is the “best,” it depends on various factors: In practice, many… Continue reading What are the different types of encryption, and which is the best?
Last Updated on 25 August 2023 by Daniel SQL injection is a type of cyber attack where malicious SQL code is inserted into a query, allowing unauthorized access to a database or manipulation of its data. It occurs when user input is not properly sanitized or validated before being used in SQL queries. Here are… Continue reading What are some examples of mySQL injection?
A data breach occurs when sensitive, confidential, or protected information is accessed, disclosed, or stolen without authorization. This can happen to individuals, organizations, or even government entities. Data breaches can lead to various negative consequences, including financial losses, identity theft, reputation damage, and legal repercussions. Common types of information targeted in data breaches include personal… Continue reading What are data breaches, and how can you avoid?