The federal government is taking aim at Optus with claims that the telco is not fully cooperating following the cyberattack.
Continue ReadingCommunications
Know How To Spot Scam Messages
Cybercriminals use many ways to try to steal your personal info online scam messages (or phishing) is one of the most common.
Continue ReadingData Breach Costs T-Mobile $350 Million
Following the data breach T- Mobile has agreed to pay $350 million to customers affected by the data breach after a class action lawsuit was lodged.
Continue ReadingMajor Optus Data Breach
Major Optus Data Breach and Optus is in major damage control after hackers accessed the personal details of up to nine million current and past customers.
Continue ReadingPegasus The Spyware Technology
Pegasus spyware can pass your phone’s security with complete access including emails, messages, GPS location, photos, video, and your phone’s microphone.
Continue ReadingThe World in 2050
The world in 2050 is a future filled with amazing technology. By 2050, artificial intelligence and virtual reality will be ubiquitous.
Continue ReadingASD Releases Coin With Secret Code
Australian Signals Directorate releases coin with secret code to mark cyber-spy agency’s 75th anniversary.
Continue ReadingFree DNS Better Security & Privacy
Quad9 is a free service that replaces your DNS configuration. Quad9 blocks lookups of malicious host names from an up-to-the-minute list of threats.
Continue ReadingTikTok and Distorted Realities
TikTok there is a dark side to the world’s most popular app and a major investigation has uncovered disturbing evidence about how the app operates.
Continue ReadingTinder The Dark Side of the App
Tinder investigation reveals the dark side of the dating app. Tinder has been downloaded more than 100 million times worldwide.
Continue ReadingiPhone, iPad, and Mac’s Vulnerable
Apple has released an update to fix vulnerable security flaws on its iPhone, iPad and Mac devices, which it said hackers may have “actively exploited”.
Continue ReadingCIA Base in the Center of Australia
Why There’s a CIA Base in the Center of Australia ?
Continue ReadingYou Need To Use a Password Manager
Do you reuse passwords? Or tweak them slightly by changing just a couple of letters? You need to stop doing that immediately, and use a password manager instead.
Continue Reading









