Sexual predators have found a new way to exploit children: taking control of their webcams to record them without their consent. Here’s how the attack works and how you can protect your kids.
If social media companies are restricted in how they collect, use and share Australians’ data, we can take significant steps toward protecting everyone from foreign interference.
Passwords are both annoying to use and vulnerable to hackers. Google is moving to support stronger, easier-to-use passkeys (and other tech companies are close behind).
Richard Forno, University of Maryland, Baltimore County
The new National Cybersecurity Strategy reiterates the government’s focus on resilient infrastructure and taking the offensive against hackers. But it also brings a fresh approach to the private sector.
Twitter and Meta are looking to make money from protecting users’ identities. This raises questions about collective security, people understanding what they’re paying for and who remains vulnerable.
Word from The Hill 0103
Author provided8.33 MB(download)
As well as her interviews with politicians and experts, Politics with Michelle Grattan includes “Word from The Hill”, where she discusses the news with members of The Conversation’s politics team
Should Australia ban ransomware payments? And should the government be able to commandeer companies’ IT systems? An expert explains the government’s new cybersecurity agenda.
The chaos in Brazil’s capital, along with the Jan. 6, 2021, insurrection in the US, demonstrate that there is a key human factor in election integrity.
Nir Kshetri, University of North Carolina – Greensboro
School officials are becoming increasingly wary of TikTok amid concerns that the app poses a risk to student safety and privacy and makes the nation vulnerable to spies.
The security treaty signed last week is the logical next step in the two countries’ relationship. But Australia’s interests in PNG should remain broad-based.