We chat to ethical hacker Zoe Rose to find out how vulnerable we really are online.
Continue ReadingThreat Defense
Google & Facebook Pay Hackers Millions
When most people think about hackers, they think about criminals. But the past decade has seen a rise in a new type of hacker the ethical hacker.
Continue ReadingCyber Attacks in Ukraine Ransomware
We’ve seen destructive cyber attacks in Ukraine masquerading as ransomware.
Continue ReadingOWASP Top 10 Security Risks
The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation dedicated to improving the security of software worldwide.
Continue ReadingWhy is Israel Good at Hacking ?
What makes Israel so good at hacking? How does a small country like Israel consistently produce some of the world’s best hackers and cybersecurity practitioners?
Continue ReadingMicrosoft View of Russia’s Cyberattacks
A Microsoft Overview of Russia’s Cyberattacks in Ukraine. Microsoft’s efforts to aid Ukraine’s response to Russia’s cyberattacks.
Continue ReadingSydney Cyber Centre to Fight Hackers
A new multi-million dollar cyber security centre has been set up at a secret location in Sydney to combat terrorists, organised criminals, and hackers.
Continue ReadingWastedLocker The Inside Story
This short documentary tells the inside story of how Symantec threat hunters detected and prevented a targeted ransomware attack called WastedLocker.
Continue ReadingHow Cybercriminals Use Social Media
How Cybercriminals Can Use Your Social Media Activity Against You. What you do on your social media channels can put your company at risk.
Continue ReadingMimecast Miss Leads to Email Attack
What happened when a Mimecast miss led to a wide scale email compromise? This video explains how an email attack evaded traditional email security tools.
Continue ReadingCIA Base in the Center of Australia
Why There’s a CIA Base in the Center of Australia ?
Continue ReadingHackers Targeting Australia
Australia is facing an increasing battle with hackers stealing people’s identities and holding businesses to ransom.
Continue ReadingYou Need To Use a Password Manager
Do you reuse passwords? Or tweak them slightly by changing just a couple of letters? You need to stop doing that immediately, and use a password manager instead.
Continue Reading