cybersecurity Archives - Stuff

cybersecurity

How to break our bad online security habits – with a flashing cyber nudge

Research has shown that when computers were fitted with proximity sensors (which facilitate online security by automatically logging users out when they move away from the machine) users began placing cups over the sensors to disable them.

Skills like ‘crap detection’ can help kids meet cybersecurity challenges head on

We educational technologists often have cybersecurity discussions with students, parents and teachers with digital fluency levels ranging from expert to little-to-no knowledge. As parents and teachers we can understandably be fearful of the role of technology in kids’ lives, however this can sometimes be a barrier to student learning.

What teenagers need to know about cybersecurity

Now that school is back in session, many high schoolers have new phones, new computers and new privileges for using their devices – and new responsibilities too. High schoolers today are more technology-savvy than average adults. While many people think that young people use their devices primarily for video games and social networking, the reality today is that high schoolers use technology for l...[Read More]

It’s time for governments to help their citizens deal with cybersecurity

Cyber criminals are extremely active across the globe – and, unfortunately, also very successful. In Africa, too, businesses are losing billions to cybercrime. A quick Internet search shows that governments in the Southern African Development Community aren’t really prioritising cybersecurity. Botswana doesn’t name cyber security as one of its national priorities. Nor does Mozambique. Zambia’s 201...[Read More]

World Cup: all the ways footballers and fans can be hacked

Visitors to the 2018 World Cup in Russia will be eager to enjoy the football and soak up the culture. But safety concerns are lurking in the background of this tournament. Whether it is the threat of racial abuse, football hooliganism, or falling victim to fraud, many football fans have good reason to be wary. But alongside these traditional threats, travelling fans and players also need to be vig...[Read More]

Deterring cyber attacks: old problems, new solutions

As the investigation into Russia’s interference in the US election deepens, it is becoming obvious that the events in 2016 are just the tip of an iceberg. Ever since the Russian cyber assault on Estonia in 2007, policymakers and cyber security scholars have debated how best to deter cyber attacks that cross international borders. Yet both state and non-state actors continue using the internet for ...[Read More]

Cyber peacekeeping is integral in an era of cyberwar – here’s why

Cyber warfare is upon us, from interference in elections to a leak of cyber weapons from a national stockpile. And, as with most evolutions in warfare, the world is largely unprepared. Cyber peacekeeping presents significant challenges, which we explore in our research. Any theatre of war now includes cyberspace. It has been used in targeted attacks to disable an adversary’s capabilities, such as ...[Read More]

Be more vigilant with digital information: vulnerabilities undermine the core of our computers’ processor security

Cybersecurity is going to be arguably the biggest trend – and threat – in 2018. I wrote that sentence before the shock announcement last week from Intel that all (yes, all) of its processors have two serious security defects that were discovered last year. In fact, all processors contain the vulnerabilities that could potentially make all computers insecure, as they affect chips made by Intel̵...[Read More]

Ransomware like Bad Rabbit is big business

October is Cybersecurity Awareness month, which is being observed in the United States, Europe, and elsewhere around the world. Ironically, it began with updates about a large-scale hack, and is ending with a large-scale ransomware outbreak. Internet firm Yahoo kicked things off on Oct. 3 when it admitted that hackers in 2013 had accessed information about all three billion of its user accounts, n...[Read More]

World War Three is being waged in cyberspace

My introduction to advanced communication technology (i.e. the Internet and World Wide Web) came in 1999. Having grown up in the two-channel universe of the 1960s and ‘70s, I was agog at the power it represented. The technology was nascent at that time — not many web pages yet existed — but I could still see the potential for good. Here was a technology that I felt could really save the world. I a...[Read More]

From botnet to malware: a guide to decoding cybersecurity buzzwords

Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but they’re part of the reality of life online. Now that we communicate, work and entertain ourselves on the internet, these familiar terms start to take on new meaning. They’re just a few of the cybersecurity threats we face. While most of us would rather leave the problem to the IT department, it’s essential we ...[Read More]

Can you ever be sure your connected kit is really secure?

Assuming you’re a regular reader of this or other technology news sites your kneejerk reaction to this headline should be “nope”. That’s a good instinct. Because just as new hardware tends to outpace the legislation that governs it, the people and companies behind that hardware tend to prioritise features, functions and time to market over security. With the pace of innovation and the potential pe...[Read More]

  • 1
  • 2

Lost Password