Scammers and what they will do to try to get your hard earned money
Liam Bartlett of 7NEWS Spotlight leads a high profile investigation into a billion dollar British crime cartel that has been exposed for defrauding $4 million a week from unsuspecting Australians.…
Read moreWhat Is Business Email Compromise (BEC)
What is BEC (Business Email Compromise) Business Email Compromise, or BEC, is a type of cybercrime where scammers use email to trick the recipient to either send money or divulge…
Read moreFAQ: What is data security and why is it important?
As the severity and frequency of cyber attacks continues to increase, data security is becoming a major concern for home users, businesses and governments alike. By 2025 it is predicted…
Read moreThreat Advisory – Critical PaperCut vulnerability being actively exploited
What is PaperCut MF & MG? PaperCut is a piece of software that allows one to manage and minimize printer waste as well as print in a sensitive documents in…
Read moreOpinion – Quantum Computing & AI
With the sudden explosion of AI, and the rapid pace of developments in quantum computing, a major shift is quickly approaching in both good and bad ways. For those of…
Read moreThreat Advisory – EvilExtractor Malware Spikes In Europe and US
Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…
Read moreWhat Is DNS?
With the rapid growth of the internet and the huge amount of both IPv4 and IPv6 addresses it would be impossible to remember all IP addresses for the sites you…
Read moreWhat is Mastodon
https://www.youtube.com/watch?v=IPSbNdBmWKE&t=4s%20%20With Elon Musk's purchase of twitter, we have see that platform steadily decline even in terms of security measures with the removal of Multi Factor Authentication (MFA), a new decentralized…
Read moreHow To Report A Security Vulnerability Responsibly
Proper disclosure of vulnerabilities is crucial to ensure hackers do not start to exploit end users using the vulnerability in question. It is important that when a vulnerability is found it…
Read more