How to Spot Phishing Lures | McAfee Blog

How to Spot Phishing Lures | McAfee Blog

Phishing attacks have all kinds of lures. And many are so tried and true that it makes them easy to spot. The target of a phishing attack is you. More specifically, your personal info and your money. Whether a scammer reaches out by email, with a text, or through a direct message, that’s what they’re after. And with a link, they whisk you off to a sketchy site designed to take them from you. Just…

Read More

Low Media Literacy: A Risk to Australia's Cybersecurity Landscape

Low Media Literacy: A Risk to Australia's Cybersecurity Landscape

A recent study by Western Sydney University, Adult Media Literacy in 2024, revealed worryingly low levels of media literacy among Australians, particularly given the deepfake capabilities posted by newer AI technologies. This deficiency poses an IT security risk, given that human error remains the leading cause of security breaches. As disinformation and deepfakes become increasingly sophisticated, the need for a cohesive national response is more urgent than ever, the report noted. Because AI can produce…

Read More

Why the UN Convention Against Cybercrime Requires a Second Look

Why the UN Convention Against Cybercrime Requires a Second Look

Cybercrime is escalating globally. Criminal groups are leveraging advanced technology to operate across borders, necessitating that law enforcement agencies have the capabilities to prevent, investigate, and prosecute these crimes while also protecting human rights. Effective international cooperation is essential to combat these threats and uphold shared values. However, the recently adopted UN Convention against Cybercrime falls short and requires more attention before ratification by member states. Concerns for human rights and liberal democracies values in…

Read More

The AI Revolution: Transforming Technology and Reshaping Cybersecurity

The AI Revolution: Transforming Technology and Reshaping Cybersecurity

Artificial Intelligence (AI) is revolutionizing government and technology, driving an urgent need for innovation across all operations. Although historically, local and state government systems have seen only incremental changes with limited AI adoption, today, a significant shift is occurring as AI is integrated across all government sectors. Benefits of AI Integration The benefits of these changes are evident. AI-powered systems analyze vast amounts of data, offering insights for better decision-making. Public services become more personalized…

Read More

SOCI Act 2024: Insights on Critical Infrastructure

SOCI Act 2024: Insights on Critical Infrastructure

A rise in ransomware incidents and the embrace of artificial intelligence are considered potential data risks facing Australia’s critical infrastructure organisations, according to a new report. This news comes as new cyber security rules under the Security of Critical Infrastructure Act 2018 come into force in August 2024. The Critical Infrastructure Edition of the 2024 Data Threat Report, by technology organisation Thales, found that ransomware incidents at critical infrastructure organisations are on the rise globally…

Read More

NIST's New Post-Quantum Cryptography Standards Announced

NIST's New Post-Quantum Cryptography Standards Announced

The U.S. National Institute of Standards and Technology this week unveiled three encryption algorithms designed to resist cyberattacks, which industry observers said are a positive step toward preventing cyberattacks that break current encryption methods. The Federal Information Processing Standard (FIPS) 203, 204, and 205 provide standards for general encryption and protecting digital signatures. They were derived from multiple submissions in NIST’s post-quantum cryptography standardization project. Quantum computers are rapidly increasing the ability for high-performance computing,…

Read More

Enabling Cyber Resiliency with NIST, Cisco Security, and Splunk

Enabling Cyber Resiliency with NIST, Cisco Security, and Splunk

Cyber resilience is a critical priority for any organization, especially for those within the US Public Sector. The need for this resiliency has never been greater for helping ensure the delivery of their mission and business outcomes. Cyber resiliency refers to an organization’s ability to prepare for, prevent, respond to, and recover from cyber incidents. Government agencies and other organizations need a robust cybersecurity framework and effective enterprise tools to achieve this. The NIST Cybersecurity…

Read More

StickmanCyber Report: Australia's Cybersecurity Skills Crisis

StickmanCyber Report: Australia's Cybersecurity Skills Crisis

A new report has found that Australia’s available pool of cybersecurity skills is smaller than realised. The report, Australia’s Cybersecurity and Technical Skills Gap, an analysis by security provider StickmanCyber and based on an analysis of ABS census and labour force data, revealed a shortage of 10,000 technical roles throughout the country. There is just one cybersecurity professional for every 240 Australian businesses. The lack of Australian security professionals is partially to blame for the…

Read More

Common Business-Related Phishing Scams Include Fake HR and IT Subject Lines

Common Business-Related Phishing Scams Include Fake HR and IT Subject Lines

Think you’ve received an important document from HR? Be careful. KnowBe4’s quarterly phishing test report found that threat actors in Q2 often found success with emails spoofing HR departments. After an ill-fated click occurred, links in the body of emails and PDF documents were common vectors for attacks. TechRepublic spoke with KnowBe4 Security Awareness Advocate Erich Kron about the results of the phishing tests and how to keep businesses safe from ever-evolving, generative AI-powered phishing…

Read More

From Cybersecurity Practitioner to Advocacy: My Journey Back to Cisco

From Cybersecurity Practitioner to Advocacy: My Journey Back to Cisco

Hello Cisco Community! I’m thrilled to share my journey back to Cisco as a Technical Advocate focused on cybersecurity. My mission is to empower you with the knowledge and tools you need to succeed in your own cybersecurity quest. I’m excited to announce my first tutorial on eBPF and my Snack Minute video demo. The demo will offer in-depth information and practical insights to help you advance your career in cybersecurity. Here’s what you can…

Read More
1 5 6 7 8 9 25