Skip to content
Padlokr
  • Home
  • Cybersecurity News
  • Cybersecurity Videos
  • Contact
Facebook Twitter Instagram Pinterest YouTube
Padlokr
Top 5 emerging cybersecurity challenges
Cybersecurity

Top 5 emerging cybersecurity challenges

Top 5 cybersecurity challenges for 2023
Cybersecurity

Top 5 cybersecurity challenges for 2023

Australian hospitals are under constant cyber attack. The consequences could be deadly
Healthcare

Australian hospitals are under constant cyber attack. The consequences could be deadly

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has
Cybersecurity

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has

Not Big Brother, but close: a surveillance expert explains some of the ways we’re all being watched, all the time
IoT | Surveillance

Not Big Brother, but close: a surveillance expert explains some of the ways we’re all being watched, all the time

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’
Cybersecurity

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’

Cyberspace and outer space are new frontiers for national security, according to an expert report
Cyberwarfare

Cyberspace and outer space are new frontiers for national security, according to an expert report

Voice deepfakes are calling – here’s what they are and how to avoid getting scammed
AI | Deepfake | Phishing | Scams | Vishing

Voice deepfakes are calling – here’s what they are and how to avoid getting scammed

Cryptocurrencies are in crisis, but they are not going to disappear
Cryptocurrency

Cryptocurrencies are in crisis, but they are not going to disappear

Six parts of your car that gather data on you
Automobiles | Forensics | Vehicles

Six parts of your car that gather data on you

Progress in detection tech could render submarines useless by the 2050s. What does it mean for the AUKUS pact?
AUKUS | Military | Warfare

Progress in detection tech could render submarines useless by the 2050s. What does it mean for the AUKUS pact?

What are the best conditions for life? Exploring the multiverse can help us find out
Physics

What are the best conditions for life? Exploring the multiverse can help us find out

Australia has a new cybersecurity agenda. Two key questions lie at its heart
Australia | Cybersecurity | Government

Australia has a new cybersecurity agenda. Two key questions lie at its heart

Electricity from thin air: an enzyme from bacteria can extract energy from hydrogen in the atmosphere
Energy | Science

Electricity from thin air: an enzyme from bacteria can extract energy from hydrogen in the atmosphere

How to avoid falling victim to an online scam – research says slow down
Phishing | Scams

How to avoid falling victim to an online scam – research says slow down

What kinds of people ‘catfish’? Study finds they have higher psychopathy, sadism, and narcissism
Phishing | Pretexting | Scams

What kinds of people ‘catfish’? Study finds they have higher psychopathy, sadism, and narcissism

Tax returns: scams are rising rapidly – how to spot a fake phone call and avoid falling victim
Scams | Vishing

Tax returns: scams are rising rapidly – how to spot a fake phone call and avoid falling victim

Amid warnings of ‘spy hives’, why isn’t Australia using its tough counter-espionage laws more?
Espionage

Amid warnings of ‘spy hives’, why isn’t Australia using its tough counter-espionage laws more?

A survey of over 17,000 people indicates only half of us are willing to trust AI at work
AI

A survey of over 17,000 people indicates only half of us are willing to trust AI at work

How to perfect your prompt writing for ChatGPT, Midjourney and other AI generators
AI | ChatGPT | Midjourney

How to perfect your prompt writing for ChatGPT, Midjourney and other AI generators

Longtermism – why the million-year philosophy can’t be ignored
Future

Longtermism – why the million-year philosophy can’t be ignored

ChatGPT is confronting, but humans have always adapted to new technology – ask the Mesopotamians, who invented writing
AI | ChatGPT

ChatGPT is confronting, but humans have always adapted to new technology – ask the Mesopotamians, who invented writing

Scams, deepfake porn and romance bots: advanced AI is exciting, but incredibly dangerous in criminals’ hands
AI

Scams, deepfake porn and romance bots: advanced AI is exciting, but incredibly dangerous in criminals’ hands

ChatGPT is a data privacy nightmare. If you’ve ever posted online, you ought to be concerned
AI | ChatGPT

ChatGPT is a data privacy nightmare. If you’ve ever posted online, you ought to be concerned

Bard, Bing and Baidu: how big tech’s AI race will transform search – and all of computing
AI

Bard, Bing and Baidu: how big tech’s AI race will transform search – and all of computing

ChatGPT threatens language diversity. More needs to be done to protect our differences in the age of AI
AI

ChatGPT threatens language diversity. More needs to be done to protect our differences in the age of AI

Nonprogrammers are building more of the world’s software – a computer scientist explains ‘no-code’
Programming | Software

Nonprogrammers are building more of the world’s software – a computer scientist explains ‘no-code’

Cryptojacking spreads across the web
Cryptocurrency

Cryptojacking spreads across the web

The best way to protect personal biomedical data from hackers could be to treat the problem like a game
Big Data | Healthcare

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

How AI is shaping the cybersecurity arms race
AI | Cybersecurity

How AI is shaping the cybersecurity arms race

Your digital footprints are more than a privacy risk – they could help hackers infiltrate computer networks
Pretexting | Social Engineering

Your digital footprints are more than a privacy risk – they could help hackers infiltrate computer networks

Improving cybersecurity means understanding how cyberattacks affect both governments and civilians
Cyberattack | Cybersecurity | Cyberwar

Improving cybersecurity means understanding how cyberattacks affect both governments and civilians

Hackathons should be renamed to avoid negative connotations
App Security | Software

Hackathons should be renamed to avoid negative connotations

Dozens of US schools, universities move to ban TikTok
Pretexting | Social Engineering | Social Media | Social Networks

Dozens of US schools, universities move to ban TikTok

How cybercriminals turn paper checks stolen from mailboxes into bitcoin
Fraud

How cybercriminals turn paper checks stolen from mailboxes into bitcoin

The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expert
Cyberattack | Cybersecurity | Hacking

The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expert

Deal with ransomware the way police deal with hostage situations
Cyberinsurance | Ransomware

Deal with ransomware the way police deal with hostage situations

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem
Cybersecurity

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem

Cyber attacks can shut down critical infrastructure. It’s time to make cyber security compulsory
Cyberattack

Cyber attacks can shut down critical infrastructure. It’s time to make cyber security compulsory

5 big trends in Australians getting scammed
Cybercrime | Phishing | Scams

5 big trends in Australians getting scammed

Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds
Darknet

Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds

How to spot a cyberbot – five tips to keep your device safe
Malware

How to spot a cyberbot – five tips to keep your device safe

Not everything we call AI is actually ‘artificial intelligence’. Here’s what you need to know
AI

Not everything we call AI is actually ‘artificial intelligence’. Here’s what you need to know

AI might be seemingly everywhere, but there are still plenty of things it can’t do – for now
AI

AI might be seemingly everywhere, but there are still plenty of things it can’t do – for now

AI and the future of work: 5 experts on what ChatGPT, DALL-E and other AI tools mean for artists and knowledge workers
AI

AI and the future of work: 5 experts on what ChatGPT, DALL-E and other AI tools mean for artists and knowledge workers

Physicists have used entanglement to ‘stretch’ the uncertainty principle, improving quantum measurements
Quantum Computing

Physicists have used entanglement to ‘stretch’ the uncertainty principle, improving quantum measurements

Philosophers have studied ‘counterfactuals’ for decades. Will they help us unlock the mysteries of AI?
AI

Philosophers have studied ‘counterfactuals’ for decades. Will they help us unlock the mysteries of AI?

Can machines invent things without human help? These AI examples show the answer is ‘yes’
AI

Can machines invent things without human help? These AI examples show the answer is ‘yes’

How far has nuclear fusion power come? We could be at a turning point for the technology
Energy

How far has nuclear fusion power come? We could be at a turning point for the technology

The ChatGPT chatbot is blowing people away with its writing skills. An expert explains why it’s so impressive
AI

The ChatGPT chatbot is blowing people away with its writing skills. An expert explains why it’s so impressive

When it comes to delivery drones, the government is selling us a pipe dream. Experts explain the real costs
Drones

When it comes to delivery drones, the government is selling us a pipe dream. Experts explain the real costs

How hiring more women IT experts improves cybersecurity risk management
Gender

How hiring more women IT experts improves cybersecurity risk management

North Korea’s nuclear program is funded by stolen cryptocurrency. Could it collapse now that FTX has?
Cryptocurrency | Cybercrime | Military | North Korea

North Korea’s nuclear program is funded by stolen cryptocurrency. Could it collapse now that FTX has?

What do we know about REvil, the Russian ransomware gang likely behind the Medibank cyber attack?
Cybercrime | Ransomware

What do we know about REvil, the Russian ransomware gang likely behind the Medibank cyber attack?

Ransomware gangs are running riot – paying them off doesn’t help
Ransomware

Ransomware gangs are running riot – paying them off doesn’t help

Should cyberwar be met with physical force? Moral philosophy can help us decide
Cyberwar

Should cyberwar be met with physical force? Moral philosophy can help us decide

Cybercrime insurance is making the ransomware problem worse
Cybercrime | Ransomware

Cybercrime insurance is making the ransomware problem worse

A new cyber taskforce will supposedly ‘hack the hackers’ behind the Medibank breach. It could put a target on Australia’s back
Hacking

A new cyber taskforce will supposedly ‘hack the hackers’ behind the Medibank breach. It could put a target on Australia’s back

Australia is considering a ban on cyber ransom payments, but it could backfire. Here’s another idea
Ransomware

Australia is considering a ban on cyber ransom payments, but it could backfire. Here’s another idea

Artemis 1 is off – and we’re a step closer to using Moon dirt for construction in space
Space

Artemis 1 is off – and we’re a step closer to using Moon dirt for construction in space

Even a limited nuclear war could devastate the world’s oceans: here’s what our modelling shows
Warfare

Even a limited nuclear war could devastate the world’s oceans: here’s what our modelling shows

When self-driving cars crash, who’s responsible? Courts and insurers need to know what’s inside the ‘black box’
AI

When self-driving cars crash, who’s responsible? Courts and insurers need to know what’s inside the ‘black box’

Do AI systems really have their own secret language?
AI

Do AI systems really have their own secret language?

Medibank hackers are now releasing stolen data on the dark web. If you’re affected, here’s what you need to know
Australia | Hacking

Medibank hackers are now releasing stolen data on the dark web. If you’re affected, here’s what you need to know

Medibank won’t pay hackers ransom. Is it the right choice?
Australia | Cybersecurity | Hacking | Healthcare

Medibank won’t pay hackers ransom. Is it the right choice?

After the Optus data breach, Australia needs mandatory disclosure laws
Australia | Cybersecurity | Hacking

After the Optus data breach, Australia needs mandatory disclosure laws

Just 25% of businesses are insured against cyber attacks. Here’s why
Cybercrime | Cyberinsurance | Cybersecurity

Just 25% of businesses are insured against cyber attacks. Here’s why

Clampdown on chip exports is the most consequential US move against China yet
China

Clampdown on chip exports is the most consequential US move against China yet

Page navigation

1 2 3 Next PageNext

Secure Password Generator

aL1DCDGD7CkUMf!HVfk@5IpWL11%

  • Agriculture
  • AI
  • App Security
  • Astronomy
  • AUKUS
  • Australia
  • Automobiles
  • Big Data
  • Blockchain
  • ChatGPT
  • China
  • Climate Change
  • Complexity
  • Cryptocurrency
  • Cryptography
  • Cyberattack
  • Cybercrime
  • Cyberespionage
  • Cyberinsurance
  • Cybersecurity
  • Cyberwar
  • Cyberwarfare
  • Dark Web
  • Darknet
  • Data Science
  • Deepfake
  • Defence
  • Digital
  • Domain Names
  • Drones
  • Education
  • Energy
  • Espionage
  • Essential Services
  • Ethics
  • FInancial
  • Food Security
  • Forensics
  • Fraud
  • Future
  • Gender
  • Government
  • Hacking
  • Healthcare
  • Hybrid Warfare
  • Infrastructure
  • Insurance
  • internet
  • IoT
  • IP address
  • IPv4
  • IPv6
  • Machine Learning
  • Malware
  • Metaverse
  • Midjourney
  • Military
  • Military Drones
  • Mobile
  • North Korea
  • Optus
  • Pacific
  • Passwords
  • Phishing
  • Physics
  • Pretexting
  • Privacy
  • Probability
  • Programming
  • Quantum Computing
  • Ransomware
  • REDSPICE
  • Robotics
  • Russia
  • Scams
  • Science
  • Security
  • Smart Devices
  • Social Engineering
  • Social Media
  • Social Networks
  • Software
  • Space
  • Spyware
  • State Actors
  • Stuxnet
  • Supercomputers
  • Surveillance
  • Ukraine
  • Utilities
  • Vehicles
  • Violence
  • Vishing
  • VR
  • Warfare

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

© 2023 Padlokr - WordPress Theme by Kadence WP

FREE REPORTIntroduction to Cybersecurity

Sign-up to our email list to receive this free pdf report and regular cybersecurity information.

Enter your email address

No thanks, I’m not interested!

  • Home
  • Cybersecurity News
  • Cybersecurity Videos
  • Contact
Search