Skip to content
Padlokr
  • Home
  • Cybersecurity News
  • Cybersecurity Videos
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • AI Art
  • Google Dorks
  • Contact
Facebook Twitter Instagram Pinterest YouTube
Padlokr
ChatGPT has many uses. Experts explore what this means for healthcare and medical research
ChatGPT | Healthcare | Medical

ChatGPT has many uses. Experts explore what this means for healthcare and medical research

Top 5 emerging cybersecurity challenges
Cybersecurity

Top 5 emerging cybersecurity challenges

Top 5 cybersecurity challenges for 2023
Cybersecurity

Top 5 cybersecurity challenges for 2023

Australian hospitals are under constant cyber attack. The consequences could be deadly
Healthcare

Australian hospitals are under constant cyber attack. The consequences could be deadly

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has
Cybersecurity

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has

Not Big Brother, but close: a surveillance expert explains some of the ways we’re all being watched, all the time
IoT | Surveillance

Not Big Brother, but close: a surveillance expert explains some of the ways we’re all being watched, all the time

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’
Cybersecurity

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’

Cyberspace and outer space are new frontiers for national security, according to an expert report
Cyberwarfare

Cyberspace and outer space are new frontiers for national security, according to an expert report

Australians lost more than $3bn to scammers in 2022. Here are 5 emerging scams to look out for
Cybercrime | Scams

Australians lost more than $3bn to scammers in 2022. Here are 5 emerging scams to look out for

If ChatGPT wrote it, who owns the copyright? It depends on where you live, but in Australia it’s complicated
AI | ChatGPT

If ChatGPT wrote it, who owns the copyright? It depends on where you live, but in Australia it’s complicated

The defence review fails to address the third revolution in warfare: artificial intelligence
AI | Military | Military Drones | Warfare

The defence review fails to address the third revolution in warfare: artificial intelligence

AI pioneer Geoffrey Hinton says AI is a new form of intelligence unlike our own. Have we been getting it wrong this whole time?
AI

AI pioneer Geoffrey Hinton says AI is a new form of intelligence unlike our own. Have we been getting it wrong this whole time?

Australia has a National Quantum Strategy. What does that mean?
Australia | Quantum Computing

Australia has a National Quantum Strategy. What does that mean?

It’s being called Russia’s most sophisticated cyber espionage tool. What is Snake, and why is it so dangerous?
Cyberespionage | Russia

It’s being called Russia’s most sophisticated cyber espionage tool. What is Snake, and why is it so dangerous?

Banning TikTok could weaken personal cybersecurity
AI | Cybersecurity | Social Media | Social Networks

Banning TikTok could weaken personal cybersecurity

Will AI ever reach human-level intelligence? We asked 5 experts
AI | Ethics

Will AI ever reach human-level intelligence? We asked 5 experts

Beyond spy balloons: here are 7 kinds of intelligence spies want, and how they get it
OSINT

Beyond spy balloons: here are 7 kinds of intelligence spies want, and how they get it

Watermarking ChatGPT, DALL-E and other generative AIs could help protect against fraud and misinformation
AI | Deepfake

Watermarking ChatGPT, DALL-E and other generative AIs could help protect against fraud and misinformation

What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past
Cybersecurity

What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past

Russia’s shadow war: Vulkan files leak show how Putin’s regime weaponises cyberspace
Cyberwar | Russia

Russia’s shadow war: Vulkan files leak show how Putin’s regime weaponises cyberspace

Don’t fret about students using ChatGPT to cheat – AI is a bigger threat to educational equality
ChatGPT

Don’t fret about students using ChatGPT to cheat – AI is a bigger threat to educational equality

Why was TikTok banned on government devices? An expert on why the security concerns make sense
Tik Tok

Why was TikTok banned on government devices? An expert on why the security concerns make sense

Has GPT-4 really passed the startling threshold of human-level artificial intelligence? Well, it depends
AI | ChatGPT

Has GPT-4 really passed the startling threshold of human-level artificial intelligence? Well, it depends

I used to work at Google and now I’m an AI researcher. Here’s why slowing down AI development is wise
AI | ChatGPT

I used to work at Google and now I’m an AI researcher. Here’s why slowing down AI development is wise

Calls to regulate AI are growing louder. But how exactly do you regulate a technology like this?
AI

Calls to regulate AI are growing louder. But how exactly do you regulate a technology like this?

Popular fertility apps are engaging in widespread misuse of data, including on sex, periods and pregnancy
App Security

Popular fertility apps are engaging in widespread misuse of data, including on sex, periods and pregnancy

Scammers can slip fake texts into legitimate SMS threads. Will a government crackdown stop them?
Vishing

Scammers can slip fake texts into legitimate SMS threads. Will a government crackdown stop them?

AI tools are generating convincing misinformation. Engaging with them means being on high alert
AI

AI tools are generating convincing misinformation. Engaging with them means being on high alert

Voice deepfakes are calling – here’s what they are and how to avoid getting scammed
AI | Deepfake | Phishing | Scams | Vishing

Voice deepfakes are calling – here’s what they are and how to avoid getting scammed

Cryptocurrencies are in crisis, but they are not going to disappear
Cryptocurrency

Cryptocurrencies are in crisis, but they are not going to disappear

Six parts of your car that gather data on you
Automobiles | Forensics | Vehicles

Six parts of your car that gather data on you

Progress in detection tech could render submarines useless by the 2050s. What does it mean for the AUKUS pact?
AUKUS | Military | Warfare

Progress in detection tech could render submarines useless by the 2050s. What does it mean for the AUKUS pact?

What are the best conditions for life? Exploring the multiverse can help us find out
Physics

What are the best conditions for life? Exploring the multiverse can help us find out

Australia has a new cybersecurity agenda. Two key questions lie at its heart
Australia | Cybersecurity | Government

Australia has a new cybersecurity agenda. Two key questions lie at its heart

Electricity from thin air: an enzyme from bacteria can extract energy from hydrogen in the atmosphere
Energy | Science

Electricity from thin air: an enzyme from bacteria can extract energy from hydrogen in the atmosphere

How to avoid falling victim to an online scam – research says slow down
Phishing | Scams

How to avoid falling victim to an online scam – research says slow down

What kinds of people ‘catfish’? Study finds they have higher psychopathy, sadism, and narcissism
Phishing | Pretexting | Scams

What kinds of people ‘catfish’? Study finds they have higher psychopathy, sadism, and narcissism

Tax returns: scams are rising rapidly – how to spot a fake phone call and avoid falling victim
Scams | Vishing

Tax returns: scams are rising rapidly – how to spot a fake phone call and avoid falling victim

Amid warnings of ‘spy hives’, why isn’t Australia using its tough counter-espionage laws more?
Espionage

Amid warnings of ‘spy hives’, why isn’t Australia using its tough counter-espionage laws more?

A survey of over 17,000 people indicates only half of us are willing to trust AI at work
AI

A survey of over 17,000 people indicates only half of us are willing to trust AI at work

How to perfect your prompt writing for ChatGPT, Midjourney and other AI generators
AI | ChatGPT | Midjourney

How to perfect your prompt writing for ChatGPT, Midjourney and other AI generators

Longtermism – why the million-year philosophy can’t be ignored
Future

Longtermism – why the million-year philosophy can’t be ignored

ChatGPT is confronting, but humans have always adapted to new technology – ask the Mesopotamians, who invented writing
AI | ChatGPT

ChatGPT is confronting, but humans have always adapted to new technology – ask the Mesopotamians, who invented writing

Scams, deepfake porn and romance bots: advanced AI is exciting, but incredibly dangerous in criminals’ hands
AI

Scams, deepfake porn and romance bots: advanced AI is exciting, but incredibly dangerous in criminals’ hands

ChatGPT is a data privacy nightmare. If you’ve ever posted online, you ought to be concerned
AI | ChatGPT

ChatGPT is a data privacy nightmare. If you’ve ever posted online, you ought to be concerned

Bard, Bing and Baidu: how big tech’s AI race will transform search – and all of computing
AI

Bard, Bing and Baidu: how big tech’s AI race will transform search – and all of computing

ChatGPT threatens language diversity. More needs to be done to protect our differences in the age of AI
AI

ChatGPT threatens language diversity. More needs to be done to protect our differences in the age of AI

Nonprogrammers are building more of the world’s software – a computer scientist explains ‘no-code’
Programming | Software

Nonprogrammers are building more of the world’s software – a computer scientist explains ‘no-code’

Cryptojacking spreads across the web
Cryptocurrency

Cryptojacking spreads across the web

The best way to protect personal biomedical data from hackers could be to treat the problem like a game
Big Data | Healthcare

The best way to protect personal biomedical data from hackers could be to treat the problem like a game

How AI is shaping the cybersecurity arms race
AI | Cybersecurity

How AI is shaping the cybersecurity arms race

Your digital footprints are more than a privacy risk – they could help hackers infiltrate computer networks
Pretexting | Social Engineering

Your digital footprints are more than a privacy risk – they could help hackers infiltrate computer networks

Improving cybersecurity means understanding how cyberattacks affect both governments and civilians
Cyberattack | Cybersecurity | Cyberwar

Improving cybersecurity means understanding how cyberattacks affect both governments and civilians

Hackathons should be renamed to avoid negative connotations
App Security | Software

Hackathons should be renamed to avoid negative connotations

Dozens of US schools, universities move to ban TikTok
Pretexting | Social Engineering | Social Media | Social Networks

Dozens of US schools, universities move to ban TikTok

How cybercriminals turn paper checks stolen from mailboxes into bitcoin
Fraud

How cybercriminals turn paper checks stolen from mailboxes into bitcoin

The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expert
Cyberattack | Cybersecurity | Hacking

The Sunburst hack was massive and devastating – 5 observations from a cybersecurity expert

Deal with ransomware the way police deal with hostage situations
Cyberinsurance | Ransomware

Deal with ransomware the way police deal with hostage situations

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem
Cybersecurity

The Colonial Pipeline ransomware attack and the SolarWinds hack were all but inevitable – why national cyber defense is a ‘wicked’ problem

Cyber attacks can shut down critical infrastructure. It’s time to make cyber security compulsory
Cyberattack

Cyber attacks can shut down critical infrastructure. It’s time to make cyber security compulsory

5 big trends in Australians getting scammed
Cybercrime | Phishing | Scams

5 big trends in Australians getting scammed

Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds
Darknet

Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds

How to spot a cyberbot – five tips to keep your device safe
Malware

How to spot a cyberbot – five tips to keep your device safe

Not everything we call AI is actually ‘artificial intelligence’. Here’s what you need to know
AI

Not everything we call AI is actually ‘artificial intelligence’. Here’s what you need to know

AI might be seemingly everywhere, but there are still plenty of things it can’t do – for now
AI

AI might be seemingly everywhere, but there are still plenty of things it can’t do – for now

AI and the future of work: 5 experts on what ChatGPT, DALL-E and other AI tools mean for artists and knowledge workers
AI

AI and the future of work: 5 experts on what ChatGPT, DALL-E and other AI tools mean for artists and knowledge workers

Physicists have used entanglement to ‘stretch’ the uncertainty principle, improving quantum measurements
Quantum Computing

Physicists have used entanglement to ‘stretch’ the uncertainty principle, improving quantum measurements

Philosophers have studied ‘counterfactuals’ for decades. Will they help us unlock the mysteries of AI?
AI

Philosophers have studied ‘counterfactuals’ for decades. Will they help us unlock the mysteries of AI?

Page navigation

1 2 3 4 Next PageNext

Password Generator

L)1CCa2rBTlW3H7NTN3E%SPHEeN7

  • Agriculture
  • AI
  • App Security
  • Astronomy
  • AUKUS
  • Australia
  • Automobiles
  • Big Data
  • Blockchain
  • ChatGPT
  • China
  • Climate Change
  • Complexity
  • Cryptocurrency
  • Cryptography
  • Cyberattack
  • Cybercrime
  • Cyberespionage
  • Cyberinsurance
  • Cybersecurity
  • Cyberwar
  • Cyberwarfare
  • Dark Web
  • Darknet
  • Data Science
  • Deepfake
  • Defence
  • Digital
  • Domain Names
  • Drones
  • Education
  • Energy
  • Espionage
  • Essential Services
  • Ethics
  • FInancial
  • Food Security
  • Forensics
  • Fraud
  • Future
  • Gender
  • Government
  • Hacking
  • Healthcare
  • Hybrid Warfare
  • Infrastructure
  • Insurance
  • internet
  • IoT
  • IP address
  • IPv4
  • IPv6
  • Machine Learning
  • Malware
  • Medical
  • Metaverse
  • Midjourney
  • Military
  • Military Drones
  • Mobile
  • North Korea
  • Optus
  • OSINT
  • Pacific
  • Passwords
  • Phishing
  • Physics
  • Pretexting
  • Privacy
  • Probability
  • Programming
  • Quantum Computing
  • Ransomware
  • REDSPICE
  • Robotics
  • Russia
  • Scams
  • Science
  • Security
  • Smart Devices
  • Social Engineering
  • Social Media
  • Social Networks
  • Software
  • Space
  • Spyware
  • State Actors
  • Stuxnet
  • Supercomputers
  • Surveillance
  • Tik Tok
  • Ukraine
  • Utilities
  • Vehicles
  • Violence
  • Vishing
  • VR
  • Warfare

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

© 2023 Padlokr - WordPress Theme by Kadence WP

FREE REPORTGenerating AI Images with Midjourney

Sign-up to our email list to receive this free pdf report and regular cybersecurity information.

Enter your email address

No thanks, I’m not interested!

  • Home
  • Cybersecurity News
  • Cybersecurity Videos
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • AI Art
  • Google Dorks
  • Contact
Search