Source: theconversation.com

New ‘virtual kidnapping’ scam targeting Chinese students makes use of data shared online

New ‘virtual kidnapping’ scam targeting Chinese students makes use of data shared online

The latest health data breach is one reason why I’ll be opting out of MyHealthRecord

The latest health data breach is one reason why I’ll be opting out of MyHealthRecord

Principles of hacktivism and hackers: ignorance and prejudices!

Principles of hacktivism and hackers: ignorance and prejudices!

The ethics of ‘securitising’ Australian cyberspace

The ethics of ‘securitising’ Australian cyberspace

How information warfare in cyberspace threatens our freedom

How information warfare in cyberspace threatens our freedom

Cryptojacking spreads across the web

Cryptojacking spreads across the web

It’s time we demanded the protection of our personal data

It’s time we demanded the protection of our personal data

The public has a vital role to play in preventing future cyber attacks

The public has a vital role to play in preventing future cyber attacks

Election security means much more than just new voting machines

Election security means much more than just new voting machines

Is counter-attack justified against a state-sponsored cyber attack? It’s a legal grey area

Is counter-attack justified against a state-sponsored cyber attack? It’s a legal grey area

Encrypted smartphones secure your identity, not just your data

Encrypted smartphones secure your identity, not just your data

What cybersecurity investigators can learn from airplane crashes

What cybersecurity investigators can learn from airplane crashes

How airplane crash investigations can improve cybersecurity

How airplane crash investigations can improve cybersecurity

Smartphone data tracking is more than creepy – here’s why you should be worried

Smartphone data tracking is more than creepy – here’s why you should be worried

Digital dark age fears stoked by Davos elite do little to address cybersecurity

Digital dark age fears stoked by Davos elite do little to address cybersecurity

Guarding against the possible Spectre in every machine

Guarding against the possible Spectre in every machine