Jeannie Marie Paterson, University of Melbourne While there is a lot of hype around the launch of Apple’s new all-glass iPhone X, the attention of consumer lawyers is probably focused in a different direction. In April, the Australian Competition
There’s a new wave of phishing emails, discovered just yesterday, targeting ANZ customers around Australia. With another going after Dropbox users on the same day. Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in
Two-factor Authentication is a security feature that requires the account holder to confirm their identity by entering a code sent to their device after signing in. The idea behind it is that a hacker attempting to get into your
Australians break a lot of smartphones. Five hundred thousand a year, according to a survey by Finder. 1,370 devices every day being dropped, thrown, stood on, sat on, bathed and otherwise just treated poorly. Millennials seem to be the ‘biggest
Security vulnerabilities are somewhat part and parcel of living in this digital world and new vulnerabilities are being discovered every single day. Two major vulnerabilities, however, have been discovered recently that given the expanse and level of chaos caused
Bitdefender researchers have found a “massive” vulnerability in over 175,000 internet connected cameras from the Shenzhen Neo Electronics company in China. Once exploited, the vulnerability allows them to be accessed for anything from remote viewing, recruited into a malicious
Shame! The ‘technical glitches’ that hit Game of Thrones could limit other popular live-streamed events Not everyone got to see Cersei Lannister (Lena Headey ) and Jaime Lannister (Nikolaj Coster-Waldau) in the opening season seven episode of Game of Thrones.
How to help kids navigate fake news and misinformation online Research has shown kids can be duped by native advertising. Syda Productions/Shutterstock Joanne Orlando, Western Sydney University Young people get a huge amount of their news from social media feeds,
How much data do you still store only on your mobile, tablet or laptop? Shutterstock/Neirfy Adnene Guabtni, Data61 We are producing more data than ever before, with more than 2.5 quintillion bytes produced every day, according to computer giant IBM.
From botnet to malware: a guide to decoding cybersecurity buzzwords Cybersecurity jargon can be intimidating, but it needn’t be. www.shutterstock.com Nicholas Patterson, Deakin University Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but