Pegasus spyware can pass your phone’s security with complete access including emails, messages, GPS location, photos, video, and your phone’s microphone.
Continue ReadingData
ASD Releases Coin With Secret Code
Australian Signals Directorate releases coin with secret code to mark cyber-spy agency’s 75th anniversary.
Continue ReadingUnited States of Secrets
Frontline tells the inside story of the United States government’s massive and controversial secret surveillance program that began in the wake of September 11.
Continue ReadingTikTok and Distorted Realities
TikTok there is a dark side to the world’s most popular app and a major investigation has uncovered disturbing evidence about how the app operates.
Continue ReadingCIA Base in the Center of Australia
Why There’s a CIA Base in the Center of Australia ?
Continue ReadingData Matters In Cybersecurity
Cybersecurity, Privacy, Data Protection, Internet Law and Policy.
Continue ReadingThe Booming Ransomware Industry
The number of businesses falling victim to ransomware attacks each year is snowballing. That’s because hackers have realized how lucrative these attacks are.
Continue ReadingTikTok to be BANNED in Australia
Australians are being warned to delete TikTok from their phone after a new report by cyber security experts discovered that sensitive information is being sent back to China.
Continue ReadingAnom Operation Trojan Shield
The FBI took control of a communications company called Anom in its infancy and turned that into a wide-reaching honeypot, with the suspected criminal users instead coming to them.
Continue ReadingHackers reveal how they got bank information
Hackers responsible for the breach of data at two Canadian banks have revealed how they got the information.
Continue ReadingBest Practices to Secure Data Lake on AWS
As customers are looking to build Data lakes to AWS, managing security, catalog and data quality becomes a challenge.
Continue ReadingGoogle Data Center Security
Security is one of the most critical elements of our data centers’ DNA. With dozens of data centers globally, security operations means managing a massively complex network. Follow Stephanie Wong, as she journeys to the core of a data center, to show you the six layers of physical security designed to thwart unauthorized access. She’ll meet experts along the way to explore the inner workings of the technology and systems that make Google Cloud one of the most robust enterprise risk management platforms.
Continue ReadingData Breaches
The latest Data Breaches news
Continue Reading