Security

Why IT systems are most at risk after the holidays

The first week after the holidays was awash with ‘back to work’ memes as people voiced their struggle at venturing...
Read more about Why IT systems are most at risk after the holidays

How to avoid being held hostage by ransomware

1
On New Year's Eve, most of us were preparing to celebrate the beginning of not only 2020 but a new...
Read more about How to avoid being held hostage by ransomware

Driverless tech should care about cybersecurity. Here’s why

The claims around the transformative nature of driverless technology to our environment, our productivity, our mobility and even our overall...
Read more about Driverless tech should care about cybersecurity. Here’s why

Why the cybersec lone wolf myth needs changing

For generations, computing experts have had a reputation as being somewhat socially awkward, which tends to result in them preferring...
Read more about Why the cybersec lone wolf myth needs changing

Is the Facebook birthday fundraiser safe?

2
If you’re a regular on Facebook and you never miss your friends’ birthdays, you’ve probably encountered one of its major...
Read more about Is the Facebook birthday fundraiser safe?

Cybersecurity tips that every teenager’s parent should know

The best way to keep your teenager out of trouble on the web is education. You should be the one...
Read more about Cybersecurity tips that every teenager’s parent should know

Why you shouldn’t risk your business by ignoring cybersecurity

For some companies like Facebook, the private data they collect represents most of their assets. For others, it’s customer data...
Read more about Why you shouldn’t risk your business by ignoring cybersecurity

The 5 worst ransomware attacks to date

In the Wild West, moving valuables from town to town was a dangerous business. At any moment, stagecoaches could be...
Read more about The 5 worst ransomware attacks to date

Australia‘s cybersecurity landscape

Just like most countries around the world, Australia’s cybersecurity landscape has been influenced by recent advancements in technology. To no...
Read more about Australia‘s cybersecurity landscape

Cybersecurity and France in 2019

As in most developed nations across the globe, cybersecurity has come into the spotlight in France in the last few...
Read more about Cybersecurity and France in 2019

Cybersecurity in Spain

As one of the largest and wealthiest countries in Europe, Spain has made deliberate efforts to lead the charge and...
Read more about Cybersecurity in Spain

Mobile banking - is it safe?

A decade back, the thought of handling your finances online seemed ludicrous. After all, serious deals require eye contact, signatures,...
Read more about Mobile banking - is it safe?

What's your identity worth on the dark web?

Cybercriminals could be assessing the value of your identity and putting it up for sale at this very moment. That’s...
Read more about What's your identity worth on the dark web?

Cybersecurity conferences to look out for in 2020

The digitization of our culture has created the need for cybersecurity at all levels of society - from the individual...
Read more about Cybersecurity conferences to look out for in 2020

Cybersecurity for journalists: making a dangerous profession safer

State-sponsored hackers are working hard to handle opposition to the status quo and spyware companies are hacking reporters just to impress their clients.
Read more about Cybersecurity for journalists: making a dangerous profession safer

Cybersecurity: trends & predictions for 2020 and beyond

Considering what we’ve experienced in the past few years regarding our data and privacy, this sobering point about our cybersecurity...
Read more about Cybersecurity: trends & predictions for 2020 and beyond

What is a DDoS attack?

What are DDoS attacks all about? Why are they so crippling? And how can you defend against them? Learn everything...
Read more about What is a DDoS attack?

What is ethical hacking? White hat hackers explained

2
The word "hacking" is often associated with illegal intrusions into military systems or digital heists. However, this is painting the...
Read more about What is ethical hacking? White hat hackers explained

10 cybersecurity experts to follow in 2019

Looking for top cybersecurity experts worth following? Here are the ten cybersec influencers who’ll make staying on top of things...
Read more about 10 cybersecurity experts to follow in 2019

Most common website attacks

We rely on websites to read the news, purchase clothes, find out about the weather, teach our children, and communicate...
Read more about Most common website attacks