Tech expert Trevor Long answers your questions regarding the data breach at Optus, including the important next steps to take to protect yourselves online.
Continue ReadingData
Federal Government Takes Aim at Optus
The federal government is taking aim at Optus with claims that the telco is not fully cooperating following the cyberattack.
Continue ReadingSuffolk County Cyber Attack
A cyber attack has targeted the computer systems of several departments in Suffolk County, shutting down many government services.
Continue ReadingPegasus The Spyware Technology
Pegasus spyware can pass your phone’s security with complete access including emails, messages, GPS location, photos, video, and your phone’s microphone.
Continue ReadingASD Releases Coin With Secret Code
Australian Signals Directorate releases coin with secret code to mark cyber-spy agency’s 75th anniversary.
Continue ReadingUnited States of Secrets
Frontline tells the inside story of the United States government’s massive and controversial secret surveillance program that began in the wake of September 11.
Continue ReadingTikTok and Distorted Realities
TikTok there is a dark side to the world’s most popular app and a major investigation has uncovered disturbing evidence about how the app operates.
Continue ReadingCIA Base in the Center of Australia
Why There’s a CIA Base in the Center of Australia ?
Continue ReadingData Matters In Cybersecurity
Cybersecurity, Privacy, Data Protection, Internet Law and Policy.
Continue ReadingThe Booming Ransomware Industry
The number of businesses falling victim to ransomware attacks each year is snowballing. That’s because hackers have realized how lucrative these attacks are.
Continue ReadingTikTok to be BANNED in Australia
Australians are being warned to delete TikTok from their phone after a new report by cyber security experts discovered that sensitive information is being sent back to China.
Continue ReadingAnom Operation Trojan Shield
The FBI took control of a communications company called Anom in its infancy and turned that into a wide-reaching honeypot, with the suspected criminal users instead coming to them.
Continue ReadingHackers reveal how they got bank information
Hackers responsible for the breach of data at two Canadian banks have revealed how they got the information.
Continue Reading







