Thursday, June 30, 2022

Cybersecurity

Imagine you had a secret document you had to store away from prying eyes. And you have a choice: You could buy a safe made by a company that kept the workings of its locks secret. Or you could...
It can affect your organisation..... With the increase in popularity and value of cryptocurrencies interest in malicious cryptomining malware is also growing strong. Cryptocurrencies use cryptography to secure transactions and mint new virtual coins which are generated when computers loaded...
An April 2018 survey by the Pew Research Centre has found that fewer people believe that “the Internet has been mostly a good thing for society” as compared to four years ago. This worsening perspective on the social benefits...
Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack. In...
The General Data Protection Regulation is a European Union privacy law that comes into effect on May 25, 2018. It has been years in the making, and is to replace the last major piece of EU privacy law which...
In early July last year, Google announced that it will expand its commercially available cloud computing services to include quantum computing. A similar service has been available from IBM since May. These aren't services most regular people will have...
As technology evolves and Australia becomes ever-more reliant on cyber systems throughout government and society, the threats that cyber attacks pose to the country’s national security are real – and significant. Cyber weapons now exist that can be used to...

RECENT POSTS