Source: theconversation.com

Weaponized information seeks a new target in cyberspace: Users’ minds - Cyber security news

Weaponized information seeks a new target in cyberspace: Users’ minds

With hacking of US utilities, Russia could move from cyberespionage toward cyberwar - Cyber security news

With hacking of US utilities, Russia could move from cyberespionage toward cyberwar

What Hollywood gets right and wrong about hacking - Cyber security news

What Hollywood gets right and wrong about hacking

Microprocessor designers realize security must be a primary concern - Cyber security news

Microprocessor designers realize security must be a primary concern

How quantum computers could steal your bitcoin - Cyber security news

How quantum computers could steal your bitcoin

CFO survey: firms being hacked, taking action to protect data - Cyber security news

CFO survey: firms being hacked, taking action to protect data

How Australian universities can get better at cyber security - Cyber security news

How Australian universities can get better at cyber security

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it - Cyber security news

How suppliers of everyday devices make you vulnerable to cyber attack – and what to do about it

Why the incoming EU copyright law will undermine the free internet - Cyber security news

Why the incoming EU copyright law will undermine the free internet

HealthEngine may be in breach of privacy law in sharing patient data - Cyber security news

HealthEngine may be in breach of privacy law in sharing patient data

Why 50,000 ships are so vulnerable to cyberattacks - Cyber security news

Why 50,000 ships are so vulnerable to cyberattacks

Revisiting metadata retention in light of the government’s push for new powers - Cyber security news

Revisiting metadata retention in light of the government’s push for new powers

Kenya’s new cybercrime law opens the door to privacy violations, censorship - Cyber security news

Kenya’s new cybercrime law opens the door to privacy violations, censorship

Internet of Things: when objects threaten national security - Cyber security news

Internet of Things: when objects threaten national security

New ‘virtual kidnapping’ scam targeting Chinese students makes use of data shared online - Cyber security news

New ‘virtual kidnapping’ scam targeting Chinese students makes use of data shared online

The latest health data breach is one reason why I’ll be opting out of MyHealthRecord - Cyber security news

The latest health data breach is one reason why I’ll be opting out of MyHealthRecord