Skip to content
Padlokr
  • Home
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • Google Dorks
  • Contact
Padlokr
What is ‘AI alignment’? Silicon Valley’s favourite way to think about AI safety misses the real issues
AI

What is ‘AI alignment’? Silicon Valley’s favourite way to think about AI safety misses the real issues

Astronomers see ancient galaxies flickering in slow motion due to expanding space
Astronomy

Astronomers see ancient galaxies flickering in slow motion due to expanding space

How QR codes work and what makes them dangerous – a computer scientist explains
QR codes

How QR codes work and what makes them dangerous – a computer scientist explains

How to encourage cyber-safe behaviour at work without becoming the office grouch
Cybersecurity

How to encourage cyber-safe behaviour at work without becoming the office grouch

You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks
Phishing

You know how to identify phishing emails – a cybersecurity researcher explains how to trust your instincts to foil the attacks

Cyberattacks to critical infrastructure threaten our safety and well-being
Cyberattack | Infrastructure

Cyberattacks to critical infrastructure threaten our safety and well-being

Ukraine war: offensive use of satellite tech a sign of how conflict is increasingly moving into space
Space | Warfare

Ukraine war: offensive use of satellite tech a sign of how conflict is increasingly moving into space

Lessons from ‘Star Trek: Picard’ – a cybersecurity expert explains how a sci-fi series illuminates today’s threats
Cybersecurity

Lessons from ‘Star Trek: Picard’ – a cybersecurity expert explains how a sci-fi series illuminates today’s threats

Intelligence agencies have used AI since the cold war – but now face new security challenges
Cyberintelligence | Intelligence

Intelligence agencies have used AI since the cold war – but now face new security challenges

Four ways criminals could use AI to target more victims
AI | Cybercrime

Four ways criminals could use AI to target more victims

Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrime
Cyberattack | Cybercrime

Moveit hack: attack on BBC and BA offers glimpse into the future of cybercrime

Car thieves are using increasingly sophisticated methods, and most new vehicles are vulnerable
Cyberattack | Vehicles

Car thieves are using increasingly sophisticated methods, and most new vehicles are vulnerable

A cancer centre is the latest victim of cyber attacks. Why health data hacks keep happening
Cybersecurity | Healthcare

A cancer centre is the latest victim of cyber attacks. Why health data hacks keep happening

Quantum computers threaten our whole cybersecurity infrastructure: here’s how scientists can bulletproof it
Cybersecurity | Quantum Computing

Quantum computers threaten our whole cybersecurity infrastructure: here’s how scientists can bulletproof it

How should a robot explore the Moon? A simple question shows the limits of current AI systems
AI

How should a robot explore the Moon? A simple question shows the limits of current AI systems

EU approves draft law to regulate AI – here’s how it will work
AI | Ethics

EU approves draft law to regulate AI – here’s how it will work

AI is already being used in healthcare. But not all of it is ‘medical grade’
AI | Healthcare

AI is already being used in healthcare. But not all of it is ‘medical grade’

There could still be a ninth planet in our Solar System – here’s why
Astronomy

There could still be a ninth planet in our Solar System – here’s why

Both humans and AI hallucinate — but not in the same way
AI

Both humans and AI hallucinate — but not in the same way

Researchers built an analogue computer that uses water waves to forecast the chaotic future
AI | Data Science

Researchers built an analogue computer that uses water waves to forecast the chaotic future

Deterring China isn’t all about submarines. Australia’s ‘cyber offence’ might be its most potent weapon
China | Cyberattack | Cyberwar | Cyberwarfare

Deterring China isn’t all about submarines. Australia’s ‘cyber offence’ might be its most potent weapon

Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds
Darknet

Darknet markets generate millions in revenue selling stolen personal data, supply chain study finds

The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public manner
Australia | Cyberwar

The highly secretive Five Eyes alliance has disrupted a China-backed hacker group – in an unusually public manner

How should Australia capitalise on AI while reducing its risks? It’s time to have your say
AI | Australia

How should Australia capitalise on AI while reducing its risks? It’s time to have your say

No, AI probably won’t kill us all – and there’s more to this fear campaign than meets the eye
AI

No, AI probably won’t kill us all – and there’s more to this fear campaign than meets the eye

From self-driving cars to military surveillance: quantum computing can help secure the future of AI systems
AI | Machine Learning | Quantum Computing

From self-driving cars to military surveillance: quantum computing can help secure the future of AI systems

Australians lost more than $3bn to scammers in 2022. Here are 5 emerging scams to look out for
Cybercrime | Scams

Australians lost more than $3bn to scammers in 2022. Here are 5 emerging scams to look out for

If ChatGPT wrote it, who owns the copyright? It depends on where you live, but in Australia it’s complicated
AI | ChatGPT

If ChatGPT wrote it, who owns the copyright? It depends on where you live, but in Australia it’s complicated

The defence review fails to address the third revolution in warfare: artificial intelligence
AI | Military | Military Drones | Warfare

The defence review fails to address the third revolution in warfare: artificial intelligence

AI pioneer Geoffrey Hinton says AI is a new form of intelligence unlike our own. Have we been getting it wrong this whole time?
AI

AI pioneer Geoffrey Hinton says AI is a new form of intelligence unlike our own. Have we been getting it wrong this whole time?

Page navigation

Previous PagePrevious 1 2 3 4 5 … 10 Next PageNext

Random Passphrase

bolster.grating.excavate.extras.outage


Password Generator

r(&OWloTp@^L8dPodESNNivQhvPn


Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Categories

  • Agriculture
  • AI
  • App Security
  • Astronomy
  • AUKUS
  • Australia
  • Automobiles
  • Big Data
  • Biometrics
  • Biomimicry
  • Blockchain
  • Business
  • ChatGPT
  • China
  • Climate Change
  • Cloud Computing
  • Complexity
  • Cryptocurrency
  • Cryptography
  • Cyberattack
  • Cybercrime
  • Cyberespionage
  • Cyberinsurance
  • Cyberintelligence
  • Cybersecurity
  • Cyberwar
  • Cyberwarfare
  • Dark Web
  • Darknet
  • Data Breach
  • Data Leaks
  • Data Protection
  • Data Science
  • Data Security
  • Decision Making
  • Deepfake
  • Defence
  • Digital
  • Digital Identity
  • Disinformation
  • Domain Names
  • Drones
  • Education
  • Energy
  • Espionage
  • Essential Services
  • Ethics
  • Facial Recognition
  • Fake News
  • FInancial
  • Food Security
  • Foreign Interference
  • Forensics
  • Fraud
  • Future
  • Gender
  • Government
  • Hacking
  • Healthcare
  • Hybrid Warfare
  • Infosec
  • Infrastructure
  • Insurance
  • Intelligence
  • internet
  • IoT
  • IP address
  • IPv4
  • IPv6
  • Iran
  • Machine Learning
  • Malware
  • Medical
  • Metaverse
  • Midjourney
  • Military
  • Military Drones
  • Misinformation
  • Mobile
  • NASA
  • Neural Networks
  • North Korea
  • Optus
  • Organisational Security
  • OSINT
  • Pacific
  • Passwords
  • Phishing
  • Physics
  • Pretexting
  • Privacy
  • Probability
  • Programming
  • Prompt Engineering
  • Public Wi-Fi
  • QR codes
  • Quantum Computing
  • Ransomware
  • REDSPICE
  • Remote Work
  • Robotics
  • Russia
  • Scams
  • Science
  • Security
  • Smart Devices
  • Smishing
  • Social Engineering
  • Social Media
  • Social Networks
  • Software
  • Space
  • Spam
  • Spyware
  • State Actors
  • Stuxnet
  • Supercomputers
  • Surveillance
  • Telecommunications
  • Tik Tok
  • Transport
  • Ukraine
  • Utilities
  • Vehicles
  • Violence
  • Vishing
  • VR
  • Warfare
  • Terms & Conditions
  • Contact
  • Cookie Policy (AU)
  • Privacy Statement (AU)
Facebook X Instagram

© 2025 Padlokr Cybersecurity

  • Home
  • Cybersecurity Glossary
  • AI Terminology / Glossary
  • Google Dorks
  • Contact
Search