Login | Support 24x7 Helpdesk Support 02 8011 0210 | 1300 660 368

CSP

ransomware
News

Nefilim Ransomware Attack Uses “Ghost” Credentials

Sophos Rapid Response has discovered that keeping close tabs on the account credentials in your organization should always be a top priority. Sophos Rapid Response is a 24/7 service that helps organizations qui...

Facial Recognition System concept.
Business Support Information Technology

Documents reveal AFP’s use of controversial facial recognition technology Clearview AI

Documents reveal how the Australian Federal Police made use of Clearview AI — a controversial facial recognition technology that is now the focus of a federal investigation. At least one officer tested the soft...

76906342
Web Solutions

LinkedIn sued over allegation it secretly reads Apple users’ clipboard content

Microsoft’s LinkedIn was sued by a New York-based iPhone user on Friday for allegedly reading and diverting users’ sensitive content from Apple’s Universal Clipboard application. According to ...

cyber-attack-2 (Small)
Business Support

NSW govt sets up vulnerability tracking centre in Bathurst

The NSW government has set up a cyber security vulnerability management centre in Bathurst, which will start operating next month. The centre will be operated by Cyber Security NSW, the new name given to what w...

COVIDSafe
Business Support

COVIDSafe was ‘sunscreen’ for coronavirus, until it wasn’t. Have we chosen the right solution to the pandemic?

When it launched, COVIDSafe was marketed as Australia’s ticket out of lockdown, so long as everyone downloaded it. “If you want to go outside when the sun is shining, you have got to put sunscreen o...

Australian government
Information Technology

Australian government and companies targeted by a sophisticated state-based actor

What’s happened? The Australian Government is aware of and responding to, a sustained targeting of Australian governments and companies by a sophisticated state-based actor. A range of tactics, techniques, and ...

google-chrome-sign (Small)
Information Technology

Spying on users of Google’s Chrome shows new security weakness

A newly discovered spyware effort attacked users through 32 million downloads of extensions to Google’s market-leading Chrome web browser, researchers at Awake Security told Reuters, highlighting the tech...

contact-tracing-api-google-apple (Small)
News

Google and Apple release technology to help with COVID-19 contact tracing

A new technology that could help alert people who have been in close contact with someone who has COVID-19 is being tested to determine if it will work in Australia.  Google and Apple have devised a COVID-19 ex...

Untitled
News

Unfixable Thunderbolt flaws bypass computer access security

A Dutch master’s student has found vulnerabilities in the Thunderbolt input/output port hardware design that lets attackers fully bypass computer access security measures such as Secure Boot, login passwo...