Cybersecurity

The paramount importance of vulnerability management

Vulnerability management is the ongoing process of identifying, assessing, prioritizing, mitigating & monitoring computer systems, networks and software. It is of paramount important in ensuring a strong security posture for…

Read more
Eagle-Eye-T-Pre-Installed-Malware-02.06.2023 Instagram

Pre-installed Malware Being Found on Millions of Android Phones Out Of The Box With No Easy Fix

A worrying new development has surfaced in the Android world where phones are coming preinstalled with malware. often disguised as legitimate harmless apps these malicious apps post a security risk…

Read more

Critical Vulnerability in Essential Addons For Elementor Currently Being Exploited By Malicious Threat Actors

On May 11th 2023 the Wordfence (web application firewall, WAF, for wordpress) team was alerted to a critical vulnerability that was found in essential addons for Elementor that has over…

Read more
CYBER WARFARE

Cyber warfare, the new battleground

Cyber warfare is the new battle ground besides traditional warfare. With todays highly interconnected world, nations as well as non state actors have realized the potential of cyberspace as a…

Read more
Google to delete inactive personal gmail accounts

Google to Delete Inactive Personal Gmail accounts not accessed in more than 2 years

Do you have an old Gmail account you have not accessed in more than 2 years? Now is your chance to login to keep your account active so it does…

Read more
Understanding the costs of a ransomware attack

Understanding the costs of a ransomware attack

As time goes by Ransomware is becoming more virulent and a major threat to the digital landscape. The use of ransomware by cyber criminals makes it an effective and easy…

Read more

Scammers and what they will do to try to get your hard earned money

Liam Bartlett of 7NEWS Spotlight leads a high profile investigation into a billion dollar British crime cartel that has been exposed for defrauding $4 million a week from unsuspecting Australians.…

Read more
Eagle-Eye-T-Banner-BEC-updated

What Is Business Email Compromise (BEC)

What is BEC (Business Email Compromise) Business Email Compromise, or BEC, is a type of cybercrime where scammers use email to trick the recipient to either send money or divulge…

Read more

FAQ: What is data security and why is it important?

As the severity and frequency of cyber attacks continues to increase, data security is becoming a major concern for home users, businesses and governments alike. By 2025 it is predicted…

Read more