How Safe Are Your Phone Apps?

Cell phones are the one thing we can’t leave home without. They’re our wallet, journal, guide and much more. On the other hand, how secure is your phone? Malicious apps can compromise security regardless of what sort of phone you have. Where you download applications from and how you utilize them plays a critical role in keeping your mobile […]

Compromised Email Scams Targeting Australian Business

  The ACSC has proclaimed rise in scams using compromised emails focusing on organizations in Australia, particularly around invoicing and payments. This type of scam is often highly targeted with hackers thoroughly researching organisations first. Typically, emails that appear to be from the CEO are sent to the head of finance, with directions to pay an invoice or transfer a […]

Cyber ‘guru’ friend to the rescue?

With an increasing number of cases of ransomware and other malicious cyber activity occurring globally, more and more people require assistance dealing with cyber issues in their home. We realize that many people will swing towards their cyber ‘guru’ friend at the first sign of trouble, rather than seek professional help. Many of us have that friend who knows lots about computers […]

‘Locky’ Ransomware Campaign Hits Australia

Locky authors have again retooled the highly persistent ransomware campaign with a new strain that performs reconnaissance on victims’ computers and goes by a new file extension name. The word doc contains embedded links that use the DDE exploit to contact a remote server & get a base64 encoded string which decodes to a set of instructions to […]

Why You Should Never Share Your Location on Social Media

What are the risks when location sharing on social media? Sharing your location, or geosharing, is becoming more and more popular on social media platforms, with Snapchat being the latest platform to include this feature. ‘Snap Map’ allows users to see all their contacts on a map and see snaps from locations around them. While […]

Beware of Phishing Emails with Attachments

Phishing emails are an attempt to collect your confidential information (usernames, passwords, or bank details) by sending an email pretending to be from a trusted source and scammers are good at recycling tried and true techniques to trick you into providing personal information. We have seen a spate of phishing (spam) emails with PDF attachments […]

Flaw in Wi-Fi Connections Leaves Users Vulnerable to Attacks

A security flaw has been discovered that could be used to hack into any device that uses Wi-Fi. A flaw in WPA2’s cryptographic protocols could be exploited to read and steal data that would otherwise be protected, according to new research from security researcher Mathy Vanhoef of KU Leuven in Belgium. In some situations, the […]

New AFP Traffic Infringement Scam

These widely circulated AFP traffic fake emails look convincing at first glance, but the subject line ‘Your info about violation is now public’ does not sound official. Clues that this is a scam email include that it is not personally addressed, there are no details about your number plate or the offence, and the fine […]

What If Something Goes Wrong – Stay Smart Online Week 2017

Falling victim to a virus, online scam or other internet nasty can be frustrating and unpleasant—but help is available. If something has knocked you offline, read the recovery guides to get back up and running! For those who have experienced identity theft or a cybercrime, there is a new online tool to help work out what has […]

Protect Your Business – Stay Smart Online Week 2017

Many businesses think they don’t have anything of interest to cybercriminals. But hackers are after just one thing—money—so it’s important you know how to keep your business’ information and assets safe. To avoid threats such as ransomware and phishing, keep your software up-to-date, install anti-virus software across all your devices, backup everything, have a system […]