Online Scams And Fraud Increasing Trends in Australia
The Australian Competition and Consumer Commission (ACCC) disclosed in a report dated May 2019 that 378,000 cases of scams, mostly from the online environment were reported to the commission for the whole of 2018. Australians collectively lost AU$489 million, 41.7% more than 2017. ACCC runs Scamwatch, which separately collected 177,516 reports, that number is so
[ Read More ]Highlights Of China Vs Amnesty International Hong Kong Cyber Attack
Hong kong is considered as an SAR or Special Administrative Region, it kept its own internal ministerial government directly elected by Hong Kong people and they continue to use their HK$ as currency. But seems like that the “autonomy” does not end there when it comes to cyberspace, as hacker groups allegedly linked with Beijing
[ Read More ]These Are The Emerging Cybersecurity Threats Of 2019
The Cyber Security arms race between hackers and security professionals took another turn in 2018 as the escalation of technology between the two sides continues. According to the Cisco’s 2018 Annual Cybersecurity Report, hackers layered their attacks with new techniques and innovations that challenged the cybersecurity defenses of organizations across the world. According to the
[ Read More ]Major IT Issues: Threats Posed By Mobile Fraud & Account Theft
Smartphones and other mobile devices such as tablets and smartwatches are fast becoming more “personal computers” than the PC. People interact with these devices and store more personally identifiable information in them more than any laptop or desktop computer. In today’s technology-driven world, even the first thing to do after waking-up is checking the notification
[ Read More ]Why The Worst Data Breaches Of 2019 Might Look Like A Nightmare
The year 2018 has seen companies hit with sizable fines and settlements due to data breaches. For example, Uber’s poor handling of its 2016 breach cost the company close to $150 million. And weakly protected, heavily-regulated health data has cost medical facilities big money, resulting in increasingly large fines from the U.S. Department of Health
[ Read More ]Beapy Cryptojacking Malware: The Return Of Eternal Blue Exploit
The Eternal Blue exploit, the infamous Windows bug that the U.S. National Security Agency weaponized and was eventually leaked by the Shadow Brokers hacking group, which was then later used for the successful WannaCry ransomware campaign in 2017 is re-emerging. WannaCry launched ransomware into public prominence and even made an estimated $4 billion profit for
[ Read More ]What Went Wrong: The 2019 Humble Bundle Security Breach Case
Humble Bundle, the digital storefront for video games is a blessing for indie game developers for at least 8 years now. The company which now operates as a subsidiary of Ziff Davis since October 2017, has been a strong force of distributing indie game titles that will otherwise are not visible to a typical gamer.
[ Read More ]The Basics Of Choosing The Best Webhosting Service
How to choose a web hosting plan: Various vendors offer webhosting service, but how should people choose which server to use? The point is the balance between cost and functionality. The cost of the webhosting server can vary considerably from a few dollars to several thousand dollars or more a month. What is the difference
[ Read More ]2019 In-Review: The Cybersecurity Risks Involving Schools Are Real
Educational institutions are where we shape our knowledge in preparation for our adulthood. For every field of study, time needs to be spent in a curriculum designed in order to maximize learning opportunities, or that should be the case. In the field of IT, especially in cybersecurity, no school or a University can claim that
[ Read More ]Espionage Malware Karkoff Campaign Revealed
Cisco Talos has revealed in a report that the new campaign initiated by a group of hackers responsible for DNSpionage earlier that uses malware to infiltrate target firms. The malware has the capability to use both regular http and dns-based communication to its command and control servers, moving data stolen from computers to the custody
[ Read More ]