Australia has been in the cyber security headlines recently with a couple of high-profile hacks that has seriously impacted millions of citizens: Now it is being reported that the Australian government is considering bringing in legislation to prevent organisations legally paying ransomware demands, in an attempt to disrupt the threat …
Australia in the cyber security spotlight – UPDATED
This article was first posted on 27 October 2022 Update 10 November 2022 The headlines say it all: Medibank: Data stolen from Australia health insurance available online – BBC News Medibank hacker says ransom demand was US$10m as purported abortion health records posted | The Guardian These criminals will have …
Continue reading “Australia in the cyber security spotlight – UPDATED”
How a phishing attack works
Today there is an excellent illustration of how a phishing attack works on SANS Internet Storm. It is complete with the offer of something the victim wants and then simply steals the Microsoft credentials the victim supplies – all because of a well-crafted spam email. Credential Harvesting with Telegram API …
Hacking is not just data theft and ransomware – it can be reputation damage. Some advice about your WordPress website and your reputation.
Fast Company an American magazine was hacked and abusive articles added to its news feeds, resulting in this material getting a wider audience through syndication on the Apple News app. The Apple News channel was quickly disabled and Fast Company took its site down pending a fix but the damage was …
Be careful of security theatre and user security fatigue
Would your Global Administrator account security up to our standard? Protecting credentials is an important step in any cyber security plan. One of the first things we always do when taking on a cyber security client, before we even embark on the fact finding and documentation, is make sure everyone …
Continue reading “Be careful of security theatre and user security fatigue”