For over two years, 14 critical zero-day vulnerabilities in Apple’s iOS have been weaponized into 5 privilege-escalating zero-click exploit chains that have remotely and completely taken over hundreds of thousands of iPhones.
Continue ReadingAttacks
Cyber Hacking
Cyber Hacking Hackers. Disinformation campaigns. Encryption.
Continue ReadingDarknet Diaries
Darknet Diaries Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Continue ReadingIndustrial Control Systems ICS-CERT Alerts
Industrial Control Systems ICS-CERT Alerts
Continue ReadingThe Digital Threat To Nations
Singapore aims to be a “Smart Digital Nation” but the more it depends on I.T., the more it opens itself to cyber threats. This is the cyber security dilemma.
Continue ReadingLaw and Order in Cyberspace
Cyberspace & physical worlds collide as cyber attacks damage nuclear facilities and kinetic attacks provoke cyber attacks.
Continue ReadingThe Five Most Dangerous New Attack Techniques
Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare?
Continue ReadingCoronavirus New Scam Targeting Online Bankers
Westpac’s director of digital security Josh Nast discusses new scams targeting a rise in online banking and shopping as people self isolate for COVID-19 coronavirus.
Continue ReadingCasanova Conman Social Engineering
Hamish McLaren may be Australia’s greatest ever conman he stole women’s hearts and then their life savings, and stashed $70 million away somewhere in the world.
Continue ReadingI Lost $1,000,000 in an Online Love Scam
Whether it’s a thousand dollars, or a hundred thousand plus, losing money to a online love scam is probably not what you have in mind.
Continue ReadingThe Dark Arts of Social Engineering
What exactly is social engineering and what goes into a social engineering campaign and what does social engineering look like ?
Continue ReadingHow to Avoid Social Engineering Attacks
Learn how identify and protect yourself from social engineering attacks, such as phishing and malware, using Google Chrome and Gmail features.
Continue ReadingMcAfee Advanced Threat Research Delta EnteliBUS Manager Vulnerability Demo
The McAfee Advanced Threat Research team discovered a zero-day vulnerability in the Delta Controls enteliBUS Manager
Continue Reading