MacDirectory magazine is the premiere creative lifestyle magazine for Apple enthusiasts featuring interviews, in-depth tech reviews, Apple news, insights, latest Apple patents, apps, market analysis, entertainment and more.
Issue link: https://digital.macdirectory.com/i/1515807
What is credential stuffing and how can I protect myself? A cybersecurity researcher explains David Tuffley - Senior Lecturer in Applied Ethics & CyberSecurity, Griffith University Special thanks to The Conversation for republishing permission. Cyber-skulduggery is becoming the bane of modern life. Australia’s prime minister has called it a “scourge”, and he is correct. In 2022–23, nearly 94,000 cyber crimes were reported in Australia, up 23% on the previous year. In the latest high-profile attack, around 15,000 customers of alcohol retailer Dan Murphy, Mexican restaurant chain Guzman y Gomez, Event Cinemas, and home shopping network TVSN had their login credentials and credit card details used fraudulently to buy goods and services in what is known as a “credential stuffing” attack. So what is credential stuffing – and how can you reduce the risk of it happening to you? Re-using the same login details Credential stuffing is a type of cyber attack where hackers use stolen usernames and passwords to gain unauthorised access to other online accounts. In other words, they steal a set of login details for one site, and try it on another site to see if it works there too.