The Deakin University Cyber Attack

It can happen to any of us … Inside the Deakin University Cyber Attack   I am a cyber security professional and I have been perplexed more than once by messages and emails having links in them. Have you received an unexpected SMS with a link for your pending parcel which almost had you click…

Social Media Cyber Security

Enjoying Your Social Media Account? So are the Cyber Artifices! How would you feel if social media didn’t exist? If you said ‘lost’, I am pretty sure many people feel the same way because, for many of us, social media is a way to express what’s going on in our minds and connect with people.…

Is my code vulnerable?

Introduction It is highly unlikely that a company with an online presence won’t own a piece of code (programme) in this day and age. The code could be a html page, SQL script, a shell script or a macro. For every line of code that you write, the chances are high that it can introduce…

Cyber Crime Smart Startups

What are cyber crime startups? What are cyber crime smart startups and how are they affecting the industry? Today, cyberspace is constantly evolving, presenting organisations with new opportunities to adopt cost-effective cloud services and use the internet to open new channels. Unfortunately, the same technologies bring unanticipated risks and consequences to cyber security. Barely a…

Quantum Computing and Cyber Security

Quantum threat: Why you need to consider it now? What’s a quantum computer (in plain language)? A quantum computer uses the rather strange properties of very small particles (smaller than an atom)  to encode information and performs special operations on that information. They are not like a normal computer (referred to as a “Classical Computer”),…

IoT Security

IoT Security – Subject of research and concern   In late 2019, Security experts from CheckPoint uncovered a security flaw in Philips Hue Smart Light Bulbs. Hackers could exploit this flaw to gain entry into the targeted Wifi Network. The firm’s researchers identified vulnerabilities in the ZigBee low power Wifi protocol used by Philips and…

How to use MITRE framework and APT19

A community superpower-MITRE APT19   How you can leverage a community superpower-The MITRE framework to combat cyber threats Introduction Cybercrime is getting more serious by the month. Hackers are getting better at tricking people into clicking on fraudulent links or opening up malicious attachments in emails. Cyber attacks are becoming organised crimes. Cybercriminals are joining…

What is the Essential 8 ?

The Australian Cyber Security Centre (ACSC) developed the Essential Eight Maturity Model, known widely as the Essential 8. The ACSC essential 8 maturity model consists of eight strategies that are part of a more extensive list called the Strategies to Mitigate Cyber Security Incidents. These eight specific strategies were singled out because they are the…

The Australian Education Sector and Cyber Attacks

Alert! The Australian Education Sector is under Attack   The recent Australian Cyber Security Centre (ACSC) threat report has revealed that approximately one-quarter of reported cyber security incidents during the 2020-21 financial year affected critical infrastructure organisations and essential services such as education. Through this period, the ACSC received over 67,500 cybercrime reports. The education…