Security
Why IT systems are most at risk after the holidays
The first week after the holidays was awash with ‘back to work’ memes as people voiced their struggle at venturing...
Read more about Why IT systems are most at risk after the holidays
How to avoid being held hostage by ransomware
On New Year's Eve, most of us were preparing to celebrate the beginning of not only 2020 but a new...
Read more about How to avoid being held hostage by ransomware
Driverless tech should care about cybersecurity. Here’s why
The claims around the transformative nature of driverless technology to our environment, our productivity, our mobility and even our overall...
Read more about Driverless tech should care about cybersecurity. Here’s why
Why the cybersec lone wolf myth needs changing
For generations, computing experts have had a reputation as being somewhat socially awkward, which tends to result in them preferring...
Read more about Why the cybersec lone wolf myth needs changing
Is the Facebook birthday fundraiser safe?
If you’re a regular on Facebook and you never miss your friends’ birthdays, you’ve probably encountered one of its major...
Read more about Is the Facebook birthday fundraiser safe?
Cybersecurity tips that every teenager’s parent should know
The best way to keep your teenager out of trouble on the web is education. You should be the one...
Read more about Cybersecurity tips that every teenager’s parent should know
Why you shouldn’t risk your business by ignoring cybersecurity
For some companies like Facebook, the private data they collect represents most of their assets. For others, it’s customer data...
Read more about Why you shouldn’t risk your business by ignoring cybersecurity
The 5 worst ransomware attacks to date
In the Wild West, moving valuables from town to town was a dangerous business. At any moment, stagecoaches could be...
Read more about The 5 worst ransomware attacks to date
Australia‘s cybersecurity landscape
Just like most countries around the world, Australia’s cybersecurity landscape has been influenced by recent advancements in technology. To no...
Read more about Australia‘s cybersecurity landscape
Cybersecurity and France in 2019
As in most developed nations across the globe, cybersecurity has come into the spotlight in France in the last few...
Read more about Cybersecurity and France in 2019
Cybersecurity in Spain
As one of the largest and wealthiest countries in Europe, Spain has made deliberate efforts to lead the charge and...
Read more about Cybersecurity in Spain
Mobile banking - is it safe?
A decade back, the thought of handling your finances online seemed ludicrous. After all, serious deals require eye contact, signatures,...
Read more about Mobile banking - is it safe?
What's your identity worth on the dark web?
Cybercriminals could be assessing the value of your identity and putting it up for sale at this very moment. That’s...
Read more about What's your identity worth on the dark web?
Cybersecurity conferences to look out for in 2020
The digitization of our culture has created the need for cybersecurity at all levels of society - from the individual...
Read more about Cybersecurity conferences to look out for in 2020
Cybersecurity for journalists: making a dangerous profession safer
State-sponsored hackers are working hard to handle opposition to the status quo and spyware companies are hacking reporters just to impress their clients.
Read more about Cybersecurity for journalists: making a dangerous profession safer
Cybersecurity: trends & predictions for 2020 and beyond
Considering what we’ve experienced in the past few years regarding our data and privacy, this sobering point about our cybersecurity...
Read more about Cybersecurity: trends & predictions for 2020 and beyond
What is a DDoS attack?
What are DDoS attacks all about? Why are they so crippling? And how can you defend against them? Learn everything...
Read more about What is a DDoS attack?
What is ethical hacking? White hat hackers explained
The word "hacking" is often associated with illegal intrusions into military systems or digital heists. However, this is painting the...
Read more about What is ethical hacking? White hat hackers explained
10 cybersecurity experts to follow in 2019
Looking for top cybersecurity experts worth following? Here are the ten cybersec influencers who’ll make staying on top of things...
Read more about 10 cybersecurity experts to follow in 2019
Most common website attacks
We rely on websites to read the news, purchase clothes, find out about the weather, teach our children, and communicate...
Read more about Most common website attacks