Australia under cyber attack!

The news media has been awash with the announcement by The Prime Minister – Scott Morrison – during a press conference, outlining that Australian Businesses, government agencies and other entities are under an active cyber attack campaign by a “sophisticated state-based actor”.

Learn about the best first things you can do to improve your cyber security posture, and marvel at how bad my drawing skills are! (and please excuse the hiccup the camera gymbal had at the beginning).

Geek is the new Gangster

The facts are out and the jury is in, with cyber-crime affecting millions and costing billions around the globe, Geeks are the new Gangsters. However, unlike Al Capone or Machine Gun Kelly all guns blazing and posing a physical threat, today's cyber criminals use stealth, deception and sophisticated technology to steal valuable business or personal data.

Connecting to Wi-Fi is simple, the security of your data is the real challenge

The traffic on our roads isn’t all we have to worry about these days. Internet traffic is on the rise, with estimates that 63% of it will be traveling through Wi-Fi networks by 2019. With increased pressure by consumers, businesses are having to offer wireless access in public spaces - this can be beneficial at first glance but can pose behind the scenes threats to not only the wireless network provider but also to the users.

New scam freezes Chrome to panic users

Con artists have created a new method of deceiving Chrome users by freezing their browsers and displaying a security notification with bogus tech-support contact details. Their ultimate goal is to scare potential victims and trick them into dialing the fake hotline number on the screen. The End Game The scam works by displaying an error […]

Distributed spam hides illegal activities

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails. Understanding DSD Distributed Spam […]

Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you. Unsecured data storage Spectre and Meltdown […]

The risks of auto-complete passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns. Let’s take a look at what you can do to stop it from targeting you. Why auto-fill passwords […]