Skip to content
Padlokr
  • Home
  • Cybersecurity News
  • Cybersecurity Videos
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • AI Art
  • Google Dorks
  • Contact
Facebook Twitter Instagram Pinterest YouTube Linkedin
Padlokr
Top 5 cybersecurity challenges for 2023
Cybersecurity

Top 5 cybersecurity challenges for 2023

Australian hospitals are under constant cyber attack. The consequences could be deadly
Healthcare

Australian hospitals are under constant cyber attack. The consequences could be deadly

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has
Cybersecurity

Zero-trust security: Assume that everyone and everything on the internet is out to get you – and maybe already has

Not Big Brother, but close: a surveillance expert explains some of the ways we’re all being watched, all the time
IoT | Surveillance

Not Big Brother, but close: a surveillance expert explains some of the ways we’re all being watched, all the time

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’
Cybersecurity

Lethal autonomous weapons and World War III: it’s not too late to stop the rise of ‘killer robots’

Cyberspace and outer space are new frontiers for national security, according to an expert report
Cyberwarfare

Cyberspace and outer space are new frontiers for national security, according to an expert report

Has the cyberattack on DP World put Australia’s trade at risk? Probably not … this time
Cyberattack | Infrastructure

Has the cyberattack on DP World put Australia’s trade at risk? Probably not … this time

Major cyberattack on Australian ports suggests sabotage by a ‘foreign state actor’
Cyberattack | Cybercrime | Cyberespionage | Cybersecurity | Infrastructure

Major cyberattack on Australian ports suggests sabotage by a ‘foreign state actor’

Explainer: what is ‘hybrid warfare’ and what is meant by the ‘grey zone’?
Hybrid Warfare

Explainer: what is ‘hybrid warfare’ and what is meant by the ‘grey zone’?

Malign Narratives Spread on Social Media Opposed The Voice Referendum
Australia

Malign Narratives Spread on Social Media Opposed The Voice Referendum

Eavesdroppers, code-breakers and digital snoops: a deep dive into one of the most secret branches of Australian intelligence
Espionage

Eavesdroppers, code-breakers and digital snoops: a deep dive into one of the most secret branches of Australian intelligence

Internet shutdowns: How governments do it
internet

Internet shutdowns: How governments do it

How drone submarines are turning the seabed into a future battlefield
Military Drones | Warfare

How drone submarines are turning the seabed into a future battlefield

Does your employer have to tell if they’re spying on you through your work computer?
Business | Remote Work | Spyware

Does your employer have to tell if they’re spying on you through your work computer?

International ransomware gangs are evolving their techniques. The next generation of hackers will target weaknesses in cryptocurrencies
Cryptocurrency | Cybercrime | Ransomware

International ransomware gangs are evolving their techniques. The next generation of hackers will target weaknesses in cryptocurrencies

Spyware can infect your phone or computer via the ads you see online – report
Malware | Mobile | Spyware

Spyware can infect your phone or computer via the ads you see online – report

AI disinformation is a threat to elections − learning to spot Russian, Chinese and Iranian meddling in other countries can help the US prepare for 2024
Disinformation | Iran | Social Engineering | Social Media

AI disinformation is a threat to elections − learning to spot Russian, Chinese and Iranian meddling in other countries can help the US prepare for 2024

Why 50,000 ships are so vulnerable to cyberattacks
Cybercrime | Cybersecurity | Hacking | Transport

Why 50,000 ships are so vulnerable to cyberattacks

Remote workers are more aware of cybersecurity risks than in-office employees: new study
Cybersecurity

Remote workers are more aware of cybersecurity risks than in-office employees: new study

Why do I get so much spam and unwanted email in my inbox? And how can I get rid of it?
Phishing | Spam

Why do I get so much spam and unwanted email in my inbox? And how can I get rid of it?

A national digital ID scheme is being proposed. An expert weighs the pros and (many more) cons
Australia | Privacy

A national digital ID scheme is being proposed. An expert weighs the pros and (many more) cons

Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrime
Cybercrime | Hacking

Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrime

Cyber-attacks against the UK Electoral Commission reveal an ongoing threat to democracy
Cyberattack | Hacking

Cyber-attacks against the UK Electoral Commission reveal an ongoing threat to democracy

‘My brother will pick it up, what’s your PayID?’ How to avoid this scam when selling stuff online
Scams

‘My brother will pick it up, what’s your PayID?’ How to avoid this scam when selling stuff online

Prompt engineering: is being an AI ‘whisperer’ the job of the future or a short-lived fad?
AI | Prompt Engineering

Prompt engineering: is being an AI ‘whisperer’ the job of the future or a short-lived fad?

US military plans to unleash thousands of autonomous war robots over next two years
Military Drones | Warfare

US military plans to unleash thousands of autonomous war robots over next two years

The US navy is still more powerful than China’s: more so than the Australian government is letting on
AUKUS | Cyberwarfare | Military

The US navy is still more powerful than China’s: more so than the Australian government is letting on

AI can help detect breast cancer. But we don’t yet know if it can improve survival rates
AI | Healthcare

AI can help detect breast cancer. But we don’t yet know if it can improve survival rates

Foreign interference through social media is an active threat. Here’s what Australia can do
Foreign Interference | Social Media

Foreign interference through social media is an active threat. Here’s what Australia can do

Worldcoin is scanning eyeballs to build a global ID and finance system. Governments are not impressed
Biometrics | Cybersecurity | Data Security

Worldcoin is scanning eyeballs to build a global ID and finance system. Governments are not impressed

Fear trumps anger when it comes to data breaches – angry customers vent, but fearful customers don’t come back
Cyberintelligence | Data Breach

Fear trumps anger when it comes to data breaches – angry customers vent, but fearful customers don’t come back

Do we need a new law for AI? Sure – but first we could try enforcing the laws we already have
AI

Do we need a new law for AI? Sure – but first we could try enforcing the laws we already have

China’s gallium and germanium controls: what they mean and what could happen next
China

China’s gallium and germanium controls: what they mean and what could happen next

Giving AI direct control over anything is a bad idea – here’s how it could do us real harm
AI | Ethics

Giving AI direct control over anything is a bad idea – here’s how it could do us real harm

Facial recognition technology could soon be everywhere – here’s how to make it safer
Biometrics | Facial Recognition

Facial recognition technology could soon be everywhere – here’s how to make it safer

Page navigation

1 2 3 … 10 Next PageNext

Password Generator

JzAYVlods%i(R03VmRX%E3npQSho


Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

Agriculture
4 Posts
AI
58 Posts
App Security
2 Posts
Astronomy
6 Posts
AUKUS
2 Posts
Australia
14 Posts
Automobiles
1 Post
Big Data
6 Posts
Biometrics
2 Posts
Biomimicry
1 Post
Blockchain
1 Post
Business
1 Post
ChatGPT
10 Posts
China
4 Posts
Climate Change
1 Post
Complexity
1 Post
Cryptocurrency
6 Posts
Cryptography
1 Post
Cyberattack
19 Posts
Cybercrime
16 Posts
Cyberespionage
4 Posts
Cyberinsurance
2 Posts
Cyberintelligence
2 Posts
Cybersecurity
45 Posts
Cyberwar
16 Posts
Cyberwarfare
11 Posts
Dark Web
2 Posts
Darknet
2 Posts
Data Breach
1 Post
Data Leaks
1 Post
Data Science
6 Posts
Data Security
1 Post
Decision Making
1 Post
Deepfake
4 Posts
Defence
1 Post
Digital
1 Post
Disinformation
1 Post
Domain Names
1 Post
Drones
2 Posts
Education
1 Post
Energy
2 Posts
Espionage
4 Posts
Essential Services
1 Post
Ethics
5 Posts
Facial Recognition
1 Post
Fake News
3 Posts
FInancial
1 Post
Food Security
1 Post
Foreign Interference
1 Post
Forensics
2 Posts
Fraud
1 Post
Future
1 Post
Gender
1 Post
Government
1 Post
Hacking
15 Posts
Healthcare
9 Posts
Hybrid Warfare
3 Posts
Infrastructure
4 Posts
Insurance
1 Post
Intelligence
1 Post
internet
3 Posts
IoT
6 Posts
IP address
1 Post
IPv4
1 Post
IPv6
1 Post
Iran
1 Post
Machine Learning
4 Posts
Malware
4 Posts
Medical
1 Post
Metaverse
3 Posts
Midjourney
1 Post
Military
8 Posts
Military Drones
5 Posts
Misinformation
1 Post
Mobile
4 Posts
Neural Networks
1 Post
North Korea
1 Post
Optus
1 Post
OSINT
1 Post
Pacific
1 Post
Passwords
1 Post
Phishing
8 Posts
Physics
1 Post
Pretexting
3 Posts
Privacy
2 Posts
Probability
1 Post
Programming
1 Post
Prompt Engineering
1 Post
QR codes
1 Post
Quantum Computing
6 Posts
Ransomware
11 Posts
REDSPICE
1 Post
Remote Work
1 Post
Robotics
2 Posts
Russia
4 Posts
Scams
7 Posts
Science
1 Post
Security
1 Post
Smart Devices
1 Post
Smishing
1 Post
Social Engineering
4 Posts
Social Media
5 Posts
Social Networks
2 Posts
Software
2 Posts
Space
8 Posts
Spam
1 Post
Spyware
5 Posts
State Actors
1 Post
Stuxnet
1 Post
Supercomputers
1 Post
Surveillance
1 Post
Tik Tok
1 Post
Transport
1 Post
Ukraine
1 Post
Utilities
1 Post
Vehicles
2 Posts
Violence
1 Post
Vishing
2 Posts
VR
1 Post
Warfare
11 Posts
  • Terms & Conditions
  • Contact
  • Cookie Policy (AU)
  • Privacy Statement (AU)
Facebook Twitter Instagram

© 2023 Padlokr Cybersecurity

  • Home
  • Cybersecurity News
  • Cybersecurity Videos
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • AI Art
  • Google Dorks
  • Contact
Search