Is Australia’s electricity grid vulnerable to the kind of cyber attacks taking place between Russia and the US?

Andrew Dowse, Edith Cowan University and Mike Johnstone, Edith Cowan University The New York Times reported earlier this month that the United States was increasing its cyber attacks on Russia’s power grid. The attacks are seen as a warning against Russian intrusions into US systems, but one that carries a risk of escalation. The public… Continue reading Is Australia’s electricity grid vulnerable to the kind of cyber attacks taking place between Russia and the US?

In the web’s hidden darknet, criminal enterprise is thriving

Daniel Prince, Lancaster University Criminals have always done their best to use new technology to their advantage and the rapid development of new digital technologies and online markets has provided the criminal entrepreneur with as much opportunity for innovation as their legitimate counterpart. Europol’s recent Internet Organised Crime Threat Assessment (iOCTA) report spells this out… Continue reading In the web’s hidden darknet, criminal enterprise is thriving

Desperate for Taylor Swift tickets? Here are cybersecurity tips to stay safe from scams

Cassandra Cross, Queensland University of Technology The global superstar Taylor Swift is bringing her Eras tour to Australia later this month, with sold-out shows in Sydney and Melbourne. With Swifties numbering in the thousands, fans who didn’t initially secure tickets are understandably desperate to find some. Enter the many fraudsters seizing this opportunity. Sadly, the… Continue reading Desperate for Taylor Swift tickets? Here are cybersecurity tips to stay safe from scams

Cybercrime victims who aren’t proficient in English are undercounted – and poorly protected

Fawn Ngo, University of South Florida In the United States, the Internet Crime Complaint Center serves as a critical component in the FBI’s efforts to combat cybercrime. The center’s website provides educational resources to help individuals and businesses protect themselves from cyberthreats and also allows them to report their victimization by submitting complaints related to… Continue reading Cybercrime victims who aren’t proficient in English are undercounted – and poorly protected

What are the worst ways to protect a website from hackers?

Protecting a website from hackers is a critical task, and there are certain practices that are considered ineffective or even counterproductive. Here are some of the worst ways to protect a website from hackers: It’s essential for website administrators and developers to stay informed about best security practices, regularly update their knowledge, and employ a… Continue reading What are the worst ways to protect a website from hackers?

What type sites are typically hacked?

Various types of websites can be targeted and hacked for different reasons. Some common types of websites that are often targeted by hackers include: It’s important to note that the motives behind hacking can vary widely, including financial gain, political activism, espionage, and even personal satisfaction. As a result, websites of all types and sizes… Continue reading What type sites are typically hacked?

Hackers can access your mobile and laptop cameras and record you – cover them up now

David Cook, Edith Cowan University Whether you use Zoom, Skype or Microsoft Teams, the webcam on your home PC or laptop device has probably never been as active as it is during this pandemic. Most of us have a camera built into our phone, tablet, laptop, or a desktop webcam we use for work, study… Continue reading Hackers can access your mobile and laptop cameras and record you – cover them up now

What is the strangest thing in the Internet of Things to be hacked?

There have been several instances where seemingly unusual or unexpected Internet of Things (IoT) devices have been hacked. One example is a smart fish tank. In 2017, a casino in Las Vegas had a smart fish tank that could regulate its own temperature and feed the fish automatically. Hackers managed to gain access to the… Continue reading What is the strangest thing in the Internet of Things to be hacked?

Which day of the year most prone to cyber-attacks?

There isn’t a specific day of the year that is universally known as the most prone to cyber-attacks. Cyber-attacks can occur at any time, and their frequency and intensity often depend on various factors, including geopolitical events, software vulnerabilities, and evolving cyber threats. However, some patterns suggest that cyber-attacks may increase during significant events or… Continue reading Which day of the year most prone to cyber-attacks?

What is difference between dictionary attacks and brute force attacks?

Dictionary attacks and brute force attacks are both types of password attacks, but they differ in their approach and methods: In summary, while brute force attacks systematically try all possible combinations, dictionary attacks rely on a predefined list of words. Both methods aim to discover passwords through automated and systematic means, but their efficiency and… Continue reading What is difference between dictionary attacks and brute force attacks?