The rise of China as a global superpower has been accompanied by its aggressive pursuit of technological advancement and data surveillance.
Continue ReadingSoftware
Beijing Plan for Global Domination
Made in Beijing the Plan for Global Market Domination. At the forefront with its sustained and brazen campaign of industrial espionage.
Continue ReadingMicrosoft AI Cybersecurity
Microsoft extending a frenzy of artificial intelligence AI software releases, is introducing new chat tools that can help cybersecurity teams.
Continue ReadingUK Bans TikTok Government Phones
Cabinet Office minister Oliver Dowden announces that TikTok has been banned from Government phones after a security review.
Continue ReadingThe World’s Worst Botnet
Emotet, one of the world’s worst Malware or Botnet has ramped up again and already has more than 130000 machines in 179 different countries compromised.
Continue ReadingIs my phone listening to me?
Is my phone listening to me everyone who uses popular social media apps like Facebook and Instagram can talk about advertisements popping into their feeds.
Continue ReadingTailscale VPN
Tailscale VPN this Zero Config VPN service magically connects all your servers, laptops, and phones to your own virtual private network.
Continue ReadingGoogle Presents AI
Watch Google’s AI and Research teams talk about the fields of robotics, natural language understanding, accessibility, healthcare, and creativity.
Continue ReadingThe Hacktivist
Celebrity hacktivist Andrew ‘Bunnie’ Huang first clashed with US tech giant Microsoft for teaching others how to modify the Xbox.
Continue ReadingIntegrating Multicloud Security
Multicloud Security is fundamentally flawed. As organizations adopt multiple clouds, security teams are faced with more complex threats.
Continue ReadingMeta Warns Data Breach on Facebook
A recent discovery on apps that require users to sign into their Facebook account had been stealing account username and password details.
Continue ReadingPegasus The Spyware Technology
Pegasus spyware can pass your phone’s security with complete access including emails, messages, GPS location, photos, video, and your phone’s microphone.
Continue ReadingDarkTrace 5 Minute Demo
This is a 5 minute demo of DarkTrace using a next generation Artificial Intelligence driven cyber security solution to respond to identified threats within an organisation.
Continue Reading