What is a VPN? VPN stands for Virtual Private Network. The technology was originally developed to allow remote workers to connect securely to their corporate computer systems when away from the office. VPNs are still widely used for this purpose,
Latest processor vulnerabilities
You may have noticed reports in the media about Intel, ARM and AMD processor vulnerabilities that may allow cybercriminals to steal data from your devices. You are advised to download patches as soon as they become available. Hackers find weaknesses
Weak passwords uncovered in large data breach
You are advised to check you have strong and different passwords for all of your online accounts, following continued reporting that billions of people have had their logins and weak passwords exposed online. A large data dump including more than
WiFi KRACK exploit affects you
The newly discovered WiFi exploit dubbed “KRACK” (or Key Reinstallation Attack) affects just about everyone using WPA2 security on their devices, which should be everyone using WiFi. The attacked exploits a flaw in the four-way authentication process between devices
Phishing for ANZ and Dropbox Customers
There’s a new wave of phishing emails, discovered just yesterday, targeting ANZ customers around Australia. With another going after Dropbox users on the same day. Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in
Enable Two-factor Authentication
Two-factor Authentication is a security feature that requires the account holder to confirm their identity by entering a code sent to their device after signing in. The idea behind it is that a hacker attempting to get into your
Keep your PC up to date!
Security vulnerabilities are somewhat part and parcel of living in this digital world and new vulnerabilities are being discovered every single day. Two major vulnerabilities, however, have been discovered recently that given the expanse and level of chaos caused
175,000 internet connected cameras vulnerable to attack
Bitdefender researchers have found a “massive” vulnerability in over 175,000 internet connected cameras from the Shenzhen Neo Electronics company in China. Once exploited, the vulnerability allows them to be accessed for anything from remote viewing, recruited into a malicious
Cloud, backup and storage devices
How much data do you still store only on your mobile, tablet or laptop? Shutterstock/Neirfy Adnene Guabtni, Data61 We are producing more data than ever before, with more than 2.5 quintillion bytes produced every day, according to computer giant IBM.
From botnet to malware
From botnet to malware: a guide to decoding cybersecurity buzzwords Cybersecurity jargon can be intimidating, but it needn’t be. www.shutterstock.com Nicholas Patterson, Deakin University Words like worm, trojan horse and zombie may seem like the stuff of science fiction, but