Saturday, February 23, 2019

Cybersecurity

Open-source hardware offers advanced protection against hacking

Imagine you had a secret document you had to store away from prying eyes. And you have a choice: You could buy a safe...

Beware: Cryptojacking is infecting the Internet of Things

It can affect your organisation..... With the increase in popularity and value of cryptocurrencies interest in malicious cryptomining malware is also growing strong. Cryptocurrencies use...
The globe of Earth | Aspioneer

Are people losing faith in the Internet

An April 2018 survey by the Pew Research Centre has found that fewer people believe that “the Internet has been mostly a good thing...
A ring lock placed on a laptop | Aspioneer

The basics of cybersecurity, small businesses take note

Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets...
GDPR Logo, Lock and Stars

GDPR: What does it mean for the world

The General Data Protection Regulation is a European Union privacy law that comes into effect on May 25, 2018. It has been years in...
A fractal design for quantum computing

Here comes quantum computing!

In early July last year, Google announced that it will expand its commercially available cloud computing services to include quantum computing. A similar service...
A phone with a stylized security application

Cybersecurity is a valid concern in the world of today

As technology evolves and Australia becomes ever-more reliant on cyber systems throughout government and society, the threats that cyber attacks pose to the country’s...

Recent Posts