Last Updated on 16 September 2022 by Daniel Brice Armel Simeu, Université du Québec à Montréal (UQAM) In 2019, more than two billion people had an internet connection — more than 60 billion Google searches per month and 156 million emails were sent per minute. These statistics hint at the intensity and penetration of the… Continue reading The COVID-19 pandemic has made us reliant on digital technologies, eroding our privacy
Category: Online Security
Cyberattacks to critical infrastructure threaten our safety and well-being
Last Updated on 15 September 2022 by Daniel Jason Jaskolka, Carleton University https://narrations.ad-auris.com/widget/the-conversation-canada/cyberattacks-to-critical-infrastructure-threaten-our-safety-and-well-being What would happen if you could no longer use the technological systems that you rely on every day? I’m not talking about your smart phone or laptop computer, but all those systems many of us often take for granted and don’t think… Continue reading Cyberattacks to critical infrastructure threaten our safety and well-being
You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks
Last Updated on 14 September 2022 by Daniel Rick Wash, Michigan State University An employee at MacEwan University got an email in 2017 from someone claiming to be a construction contractor asking to change the account number where almost $12 million in payments were sent. A week later the actual contractor called asking when the… Continue reading You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks
How vulnerable is your personal information? 4 essential reads
Last Updated on 13 September 2022 by Daniel Eric Smalley, The Conversation When you enter your personal information or credit card number into a website, do you have a moment of hesitation? A nagging sense of vulnerability prompted by the parade of headlines about data breaches and hacks? If so, you probably push those feelings… Continue reading How vulnerable is your personal information? 4 essential reads
Comic book introduces kids to key concepts and careers in cybersecurity
Last Updated on 12 September 2022 by Daniel Kara Dawson, University of Florida and Pavlo Antonenko, University of Florida Three 9-year-old girls are huddled around a Caesar wheel, an ancient tool for sharing secret messages. Cracking a code is one of many challenges the girls complete to help characters in CryptoComics escape a mysterious cyberworld… Continue reading Comic book introduces kids to key concepts and careers in cybersecurity
How vulnerable is your personal information? 4 essential reads
Last Updated on 10 September 2022 by Daniel Eric Smalley, The Conversation When you enter your personal information or credit card number into a website, do you have a moment of hesitation? A nagging sense of vulnerability prompted by the parade of headlines about data breaches and hacks? If so, you probably push those feelings… Continue reading How vulnerable is your personal information? 4 essential reads
You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks
Last Updated on 8 September 2022 by Daniel Rick Wash, Michigan State University An employee at MacEwan University got an email in 2017 from someone claiming to be a construction contractor asking to change the account number where almost $12 million in payments were sent. A week later the actual contractor called asking when the… Continue reading You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks
What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what’s at stake
Last Updated on 7 September 2022 by Daniel Santiago Torres-Arias, Purdue University Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide range of computer systems. Jen… Continue reading What is Log4j? A cybersecurity expert explains the latest internet vulnerability, how bad it is and what’s at stake
Five things South Africa must do to combat cybercrime
Last Updated on 6 September 2022 by Daniel Basie von Solms, University of Johannesburg Cyber-attacks are on the rise globally, with seriously negative implications for countries’ strategic, national, economic and social well-being. A cyber-attack can be defined as an unauthorised attempt – successful or not – to infiltrate a computer or computer system for malicious… Continue reading Five things South Africa must do to combat cybercrime
Stop blaming people for choosing bad passwords – it’s time websites did more to help
Last Updated on 5 September 2022 by Daniel Steven Furnell, University of Nottingham Year after year, passwords like “123456”, “qwerty” and even “password” are found to be the most popular choices and 2021 was no exception. These reports generally come with the same advice to users: create better passwords to protect your security online. Although… Continue reading Stop blaming people for choosing bad passwords – it’s time websites did more to help