Most internet users wouldn't want to share their browsing history with the rest of the world. (It's one of the reasons incognito mode is so popular.) This is especially true of people who look at questionable online material. So what would you be willing to pay if someone had a secret recording of you watching porn, taken on your webcam?
Tagged With cybercrime
Predicting the future is near impossible -- but that doesn‘t stop us all from having a red hot go. Human beings have been predicting the future since the beginning of history and the results range from the hilarious to the downright uncanny.
One thing all future predictions have in common: they‘re rooted in our current understanding of how the world works. It‘s difficult to escape that mindset. We have no idea how technology will evolve, so our ideas are connected to the technology of today.
The deep web and its inner recess, the dark web -- those less well-trodden parts of the internet beyond the reach of Google and Bing -- are not for the faint-hearted or untrained. With the right tools, however, there's little to fear and plenty to discover. Here's how you can start exploring the deep web without having to worry about your digital well-being.
Reporting a crime should not be as traumatic as the experience of the crime itself. But unfortunately this is the sad reality for many victims of online fraud. Australians reported more than $229 million lost to fraud according to a report published last year by the Australian Competition and Consumer Commission (ACCC).
But behind every statistic is a person, and there are millions of victims globally who experience a wide range of online fraud. Read on to find out more.
The persistent rumour of a massive Dropbox hack has finally been confirmed -- and the details aren't good. Independent analysis has revealed that over 68 million Dropbox user names and passwords are freely available on the internet. If you didn't do it already, you really need to reset your password.
If you’ve ever forgotten your phone or left it at home for the day, you will have realised just how much you use it. On average, we check our mobile phones about 110 times a day. Using them for just about everything, from summoning an Uber car and paying for our latest Amazon purchases, to receiving prescriptions and even tracking shares and trading on the stock market.
Mr Robot is a fictional TV drama following the life and times of security engineer, hacker and cyber-vigilante Elliot Alderson. The show has won plaudits for turning hacktivism and cybersecurity into exciting television -- but is any of it accurate? During a recent Reddit AMA, Kasperksy Lab's global director Costin Raiu weighed in on the authenticity of the show. Read on for his opinion.
In 2015, a whopping $229 million was reported stolen through online scams in Australia. Over 130,800 scam complaints were made to the Australian Cybercrime Online Reporting Network (ACORN) and ACCC -- a sharp increase from the previous year. In short, Aussies are losing more money and getting scammed more often, with the main culprits being investment and online dating scams. Here are some tips from the ACCC to help you protect yourself.
As any online shopper knows, all credit cards have a 3-digit card verification value (CVV or CVV2) code printed on the back. Merchants are forbidden from storing this information -- so how do online fraudsters manage to get hold of it? Here's what you need to know.
Do you have a competitor to your business that you want to bring down? Why not launch a distributed denial of service (DDos) attack on them to cripple their website? You may not have the technical skills to do this yourself but there are plenty of hackers out there who are offering up their unique and highly illegal skillsets to do it for you; and they provide great customer service to boot. Want to find out more? Read on.
Not all hackers are out to get you. Ethical or "white hat" hackers use their expertise to evaluate the security of existing computer networks so they can be improved and strengthened. This infographic lists 15 famous ethical hackers, the vulnerabilities they helped to expose and how much cash they received for their troubles.
Booking holidays online is vastly preferable to the old ring-around method. It's simple, convenient and you have a much better chance of landing a discount. However, it is also rife with potential dangers; especially if you're new to online shopping. This infographic from AVG Technologies looks at how to avoid the scammers -- both before and during your holiday.
You might not think that an academic computer science course could be classified as an export of military technology. But under the Defence Trade Controls Act -- which passed into law in April, and will come into force next year -- there is a real possibility that even seemingly innocuous educational and research activities could fall foul of Australian defence export control laws.