Cybersecurity

Understanding the costs of a ransomware attack

Understanding the costs of a ransomware attack

As time goes by Ransomware is becoming more virulent and a major threat to the digital landscape. The use of ransomware by cyber criminals makes it an effective and easy…

Read more

Scammers and what they will do to try to get your hard earned money

Liam Bartlett of 7NEWS Spotlight leads a high profile investigation into a billion dollar British crime cartel that has been exposed for defrauding $4 million a week from unsuspecting Australians.…

Read more
Eagle-Eye-T-Banner-BEC-updated

What Is Business Email Compromise (BEC)

What is BEC (Business Email Compromise) Business Email Compromise, or BEC, is a type of cybercrime where scammers use email to trick the recipient to either send money or divulge…

Read more

FAQ: What is data security and why is it important?

As the severity and frequency of cyber attacks continues to increase, data security is becoming a major concern for home users, businesses and governments alike. By 2025 it is predicted…

Read more
Banner HTML

HTML misused in a malicious manner

HTML, or Hyper Text Markup Language, has been misused by malicious threat actors for years. In a report published by Barracuda, it was observed that roughly 21% of the HTML…

Read more
Threat advisory

Threat Advisory – Critical PaperCut vulnerability being actively exploited

What is PaperCut MF & MG? PaperCut is a piece of software that allows one to manage and minimize printer waste as well as print in a sensitive documents in…

Read more
Threat Advisory EvilExtractor Malware Spikes In Europe and US

Threat Advisory – EvilExtractor Malware Spikes In Europe and US

Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…

Read more

Opinion: Cybersecurity for everyone

Cybersecurity companies mainly focus on large enterprises. This leaves those residential clients, micro, small and medium enterprises potentially not able to afford proper cybersecurity solutions. It is rather unfair that cyber…

Read more

What is DMARC?

DMARC, or Domain Based Message Authentication, Reporting & Conformance, is a way to authenticate email messages originating from ones own domain. This improves deliverability, as well as increases domain reputation but…

Read more
5 warning signs of a phishing email

Signs To Watch Out For If You Suspect An Email To Be A Phishing Email

One of the many types of cyber crimes that are used by malicious threat actors is that of phishing. Phishing usually targets one or more individuals by email, telephone or…

Read more