The Conversation

Australia: Sydney-based cancer center is the latest victim of a cyberattack

It seems hardly a day goes by without another report of a cybercrime incident. With Medibank still fresh in our minds, the latest attack is on a Sydney-based cancer treatment facility, Crown Princess Mary Cancer Centre in Westmead Hospital.

Banning TikTok could weaken personal cybersecurity

TikTok is not the first app to be scrutinized over the potential exposure of U.S. user data, but it is the first widely used app that the U.S. government has proposed banning over privacy and security concerns.

Scammers can slip fake texts into legitimate SMS threads. Will a government crackdown stop them?

Last month, the Australian government announced plans to fight SMS-based scams by implementing an SMS sender ID registry. Under this system, organizations that want to SMS customers will first have to register their sender ID with a government body.

How hackers can use message mirroring apps to see all your SMS texts — and bypass 2FA security

A malicious actor can remotely access a user’s SMS-based 2FA with little effort, through the use of a popular app designed to synchronize user’s notifications across different devices.

Improving cybersecurity means understanding how cyberattacks affect both governments and civilians

Increasingly, rampant cyberattacks target critical civilian infrastructures, including health facilities, pipelines, water plants, and food supply chains, as well as technology firms.

A Chinese hacking competition may have given Beijing new ways to spy on the Uyghurs

With the advent of the Tianfu Cup, China appears to have access to a new talent pool of expert hackers, motivated by the competition’s prize money to produce potentially harmful hacks that Beijing may be willing to use both at home and abroad.

RMIT attack underlines need to train all university staff in cyber safety

Cybercriminals are very persistent and the daily numbers of cyberattacks show no sign of decreasing. This can jeopardize the reputation of students and academics as well as the institution itself.

Cybersecurity risks and how to manage them

The rapidly evolving nature of the risk due to new threat actors and attack types makes it difficult to assess, and all organizations are currently struggling with how to manage cybersecurity risk.

Ransomware can interfere with elections and fuel disinformation – basic cybersecurity precautions are key to minimizing the damage

Ransomware attacks frequently begin through email as a typical phishing message purporting to be from someone the potential victim trusts, such as a co-worker or friend, to bait them into opening it.

Airports, ATMs, hospitals: Microsoft Windows XP leak would be less of an issue, if so many didn’t use it

The source code of the Windows XP operating system is now circulating online as a huge 43GB mega-dump. Although it is nearly two decades old, it’s still used by many organizations around the world.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags