What Is Phishing? Everything You Need to Know

Phishing is one of the most pervasive cybersecurity problems. Believe it or not, phishing attacks have been around since the early days of the internet. The first recorded phishing attempt was conducted by a group of hackers in the mid-1990s. They used the America Online service to steal log-in details and credit card information from …

What is Data Security? Everything You Need to Know About Data Security

Cyberattacks are an ever-present threat. Anyone can fall prey to cyberattacks, from small businesses to government agencies. During the 2020-2021 financial year, the Australian Cyber Security Centre (ACSC) received over 67.500 cybercrime reports, indicating an increase of around 13% compared to last year. This equates to one report every 8 minutes, with a large number …

The State of Cloud Security and Issues to Watch Out For

Many companies have migrated to cloud-based technologies in the past year due to stiff competition and the high demand for business-critical applications to be accessible in the face of remote working. In Australia alone, 55% of businesses have incorporated paid cloud models into their budgets from 2019 to 2020. Figures indicated that the larger the …

Everything You Need to Know About Malware Protection

Malware can affect and wreak havoc on your devices at any given time. It may have iterations and its effects may vary according to its form. Malware can be used to collect and expose sensitive personal information for purposes of identity theft. It can also be used to steal financial data. With malware attacks becoming …

Cybersecurity 101: Discovering the Ins and Outs of Ransomware and How to Avoid It

The digital era has optimised the way people communicate and work. Today, members of an organisation can conveniently share and access files and data from anywhere in the world. However, this also puts vital data at more risk of being accessed by unsavoury characters and being infected with malicious software. One such malicious software is …

Cybersecurity 101: All You Need to Know About Cybersquatting or Domain Squatting

Ever since the dawn of the digital age, websites have become a crucial part of many businesses. Consumers across the globe head to the Internet when they want to learn more about products and services. That’s why business owners use their websites to list all the information that potential customers may want to know. The …

Why Good Database Security is Important

Around 36 billion records were compromised from January to September of 2020. Nearly a billion of those records were exposed during two breaches in the third quarter of the year. According to the same report, cybercriminals are still the main drivers behind these breaches. However, misconfigured databases and services are the key factors that continue …

Microsoft Power Apps Misconfiguration Exposes 38 Million Personal Records

Microsoft Power Apps misconfiguration exposes 38 million personal records A highly common misconfiguration on Microsoft Power Apps was found to have led to the exposure of 38 million personal records containing information such as COVID-19 vaccination status and social security number (SSN). Microsoft Power Apps is an online platform that provides tools for developing low-code …

T-Mobile Confirms 48 Million Personal Records Breached in Cyberattack

T-Mobile confirms cyberattack compromising personal data of 48 million customers On August 15, a hacker claimed to have breached T-Mobile and stolen 106 GB of data containing the names, addresses, account login credentials, and social security numbers (SSN) belonging to 100 million customers. A sample dataset of 30 million driver’s licence numbers and SSNs were …

Can AR Glasses Replace Smartphones?

Conan, the famous Japanese animation ‘Case Closed’ protagonist, is famous for wearing special glasses. These glasses not only track the location of criminals but also have infrared detection and magnification capabilities. Another famous animation Dragon Ball also features unusual glasses called ‘Scouts’. Characters wear scouts, measure the combat power of their opponents, and obtain information. …

Cofence
ThreatX logo
Crowdstrike
thycotic
fortinet
zscaler
Rapid7
SentinelOne
netskope
ExtraHop
cyberfish
Qualys
Logpoint
IBM
mimecast
Cisco