A Melbourne student has pleaded guilty to hacking into Apple’s secured system after the organization told experts of the interruption (via The Age). The teenage minor, who can’t be named for legal reasons, showed up at an Australian Children’s Court on Thursday facing allegations of hacking into Apple’s servers on different events. Details of the
Similar to Japan, Australia is one of the few countries with a growing elderly population—and even though both economies are stable and strong, this reality will soon need some attention. For Australians, one of the biggest threats to their future is the lack of younger, skilled cybersecurity professionals who can uphold industry best practices. The
Turn out, 2017 was a crazy year for data breaches. No one can forget the massive Equifax disaster, which exposed the sensitive information of millions of customers to cybercriminals around the world. And of course, there was the attack on the Republican National Committee which leaked personal data of over 200 million American voters. Oh,
Not only has the 21st century introduced a whole new way thinking about the world, it has forced people living in big cities to change their collective mindset. The rise of “smart cities,” complete with their various types of electronic data collection sensors and information-gathering resources, has dramatically altered the attack vector on the people
The average person in the world today keeps a ton of “stuff” on their smartphone. Gone are the days when making a call was the only thing you could do—now there’s basically nothing you can’t do on your mobile device—aside from keeping it completely safe, that is. Emailing, banking, shopping, it’s all right there at
A new study by cybersecurity firm Rapid 7, recently revealed that their penetration testers have successfully exploited at least one software vulnerability used by about 84% of all the companies included in the study. The test was done in early September 2017 through mid-June 2018 and involved a total number 268 companies. A software vulnerability is any
In a recent intelligence report, the U.S. Department of Homeland Security has revealed serious weaknesses in Gmail’s new interface, many of which appear to be highly exploitable. As a top email service released in April 2004, Gmail has become the de-facto mode of digital communication for many people, especially those using an Android mobile device.
Of all the digital threats organizations are facing today, nothing beats the worst of the worst, otherwise known as human error. Data theft, information leaks, virus infections, spear phishing, spam, identity theft, corporate espionage, and the latest, cryptojacking infections are now all working together to compromise the systems and steal the data of online businesses.
As part of the world’s biggest public network, the darknet is not for the faint-of-heart and should be treated as a highly volatile digital environment. Not only is it not accessible through a regular browser and mainstream internet connection—it contains vulnerabilities we haven’t even begun to image. It is not hidden because of secrecy, but
The recent implementation of GDPR and the race for increased corporate compliance with issues of privacy has generated a lot of noise in the cybersecurity industry, most of which stems from a lack of overall understanding about the new measures—and what they mean for the future of online business. An article recently published by Motherboard suggests