Annika Smethurst scapegoated by government
On 29 April 2018, NewCorp journalist, Annika Smethurst, reported that the federal government was wanting to expand its powers to spy on Australian citizens. This
Join me as I undertake my Masters of Cyber Security
On 29 April 2018, NewCorp journalist, Annika Smethurst, reported that the federal government was wanting to expand its powers to spy on Australian citizens. This
Shifting Security Left is a paradigm that encourages a proactive, rather than reactive – approach to security. The term is in reference to the software
An interesting and concerning security in the news this week. It has been alleged that Israelli Cyber Surveillance Company, NSO’s software has been used by
Identity theft is a major problem. It occurs when criminals collect enough of your personal information to convince people that they are you. What sort
Data hungry website We all know that websites are tracking us all of the time, as I mentioned the data tracking economy when I explored
Considering what I have learnt this week (in this post), I’ve decided it’s time to cast a critical eye over my own password management practices.
How do people treat passwords? The Avast report about Americans and passwords makes for disturbing reading. https://press.avast.com/83-of-americans-are-using-weak-passwords Many Americans use personal information such as partner’s
This week we were challenged to physically destroy some data. I’ve chosen to unshred a document. Not a special document , just some junk mail
For an activity this we were tasked with finding an example of an insider attack. An insider attack could be carried out by a true
Introduction Want to know how to protect yourself and limit the damage caused by a cyber attack? The Essential Eight was released by the Australian
© Copyright 2021, Luke Hally