In a recent blogpost, Microsoft announced that Fancy Bear hackers are ramping up their efforts to
$190M Worth of Cryptocurrency ‘Lost’ After CEO’s Death
On 15 January 2019, Canada’s largest cryptocurrency exchange, QuadrigaCX, announced the sudden
The Equifax Breach: Where Did the Data Go?
A great mystery has gripped the security world for some time now, and unfortunately more questions
The Rise of Ransomware: How To Protect Your Business
Ransomware is malicious software that encrypts all the files on a computer and demands payment to
Yubico 2019 State of Password and Authentication Report
Password authentication has become part of regular life for many individuals who use digital devices
2019 Thales Data Threat Report Summary
Every year the cloud and data security firm Thales publish a detailed report on the state of data
The “Collection” Mega Data Leak – Are You Affected and What Can You Do?
A couple of weeks ago, word of a monolith data leak was being discussed on various hacker forums.
Spoof Email Scams
The FBI 2017 Internet Crime Report stated that “business email compromises” caused more than US$5
The Privacy Feud Between Apple and Facebook
The battle for privacy and reputation raging between Apple and Facebook has begun to heat up after
FBI Case Data Leaked
Late last year the Oklahoma Department of Securities (ODS) failed to secure 3 terabytes of data,
DNS Hijacking – What is it?
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) issued
Nairobi Hotel Attack: The Importance of Hotel Security
Earlier this month in Nairobi, Kenya, a group of violent extremists raided an upscale hotel with a
Latest Australian Data Breach Report Released
At the closing of each quarter, the Office of the Australian Information Commissioner (OAIC)
The Impact of ‘NotPetya’ on Future Cyber Insurance Policies
In an unprecedented move, insurance giant Zurich is refusing to pay a $100 million claim for damage
ICAC Report Highlights Technology & Cybercrime
The Independent Commission Against Corruption (ICAC), established in 1988 to protect public interest
Jailbroken mobile devices and Mobile Device Management (MDM)
Some mobile phones and tablets may be jailbroken or “rooted” to be used in ways unintended by the
















