Everything you need to know about security and encryption.

Social engineering in cyber security: The art of manipulation and defence

Sep 18, 2023

In today's digital world, the battle for security extends beyond firewalls and encryption protocols. Social engineering continues to emerge as the biggest threat to businesses and individuals. In fact, social engineering attacks account for about 25% of data breaches in small and medium-sized enterprises (SMEs), according to the OAIC.

Using open-source intelligence (OSINT) in cyber security

Sep 04, 2023

Open-source intelligence (OSINT) has emerged as a vital tool for cyber security. It’s used by businesses, governments, and other organisations alike to gather cyber intelligence from publicly available and legally accessible sources.

The rise of automotive hacking & the vulnerabilities of modern vehicles

Aug 21, 2023

Modern and electric vehicles (EVs) are now sophisticated computerised systems on wheels, and while their smart features make driving more convenient (and sometimes fun), they’re also introducing more cyber threats. Cars with connected systems have more control vulnerabilities and are more susceptible to cyber attacks — or automotive hacking.

10 ways to use AI to bolster your cyber security

Aug 07, 2023

Traditional solutions may only sometimes suffice in the ever-evolving landscape of cyber security. Organisations can use the synergy between artificial intelligence (AI) and human expertise to protect their digital assets from cyber threats and malicious actors. Here are ten ways to use AI to bolster your cyber security.

Cloud vulnerabilities to be aware of

Jul 19, 2023

Cloud computing offers endless opportunities and competitive advantages for scalability, IT performance and data security. However, there are known cloud computing vulnerabilities to be aware of. Cloud computing system vulnerabilities can be exploited by cyber criminals and lead to data breaches, unauthorised access to networks, and potential financial losses.

Indicators of compromise (IOCs) guide

Jul 12, 2023

Suspicious network activity, malware attacks and cyber breaches typically leave digital red flags – or indicators of compromise (IOCs) − that can alert security teams of these security threats and help better coordinate incident response and disaster recovery.

Crypto crackdown – Why are banks banning crypto?

Jul 05, 2023

Banks are slowly banning decentralised cryptocurrencies – is it to protect customers from scam risks or to make way for their own centralised digital currencies?

Is WhatsApp safe? Main security issues

Jun 28, 2023

WhatsApp is trusted by over 2 billion active users and is the top encrypted cross-platform messaging app in the world by market share. The Meta-owned service provides free messaging and end-to-end encryption on all communications, but how safe is it really?

What is spyware & how to protect yourself

Jun 21, 2023

It may sound like a gadget you’d hear about in a spy movie, but spyware is very real and malicious.  You never see it coming and may not even be aware of it (until it’s too late), plus spyware can be very hard to get rid of.

Sandbox security defined

Jun 14, 2023

Anyone who’s ever been to a beach will know − sand gets everywhere. It’s the same deal when you code and use programs and web applications that can interfere with the rest of your operating system. Pairing programs or having various developers write code can get messy quickly, putting your operating system and devices at risk. Add potentially risky programs, misconfigured files, or code and things get downright dirty. That’s where sandboxing comes in.