Rocky breach

Rocky breach 1

Random gifts arriving in the mail and reviews for goods and services that don’t belong under the name they were written. Personal fraud is part of a digital life but if this happens to you, report it, it helps us understand the financial and psychological damage. How can we possibly trace the source or keep track of the pervasiveness of cyber fraud. Have we managed to train ourselves to be cyber warriors in protection of our own data and therefore our privacy or is cyber fraud happening less?

Telco incommunicado

Telco incommunicado 2

Optus is deeply apologetic over the latest threat to their customers’ details following a significant cyberattack. The fallout to their customer base and to the security of private data is one of confusion and distrust. Customers were put on high alert early, to note any suspicious activity on their accounts and any notifications that could be asking for information from a source unknown or a fake account. Account holders were told to stay informed, complete a credit check, change Medicare details and apply for a new licence.

Hearty hacking

Hearty hacking 4

The hacking of any social media account has ramifications far beyond that one platform or that one individual. An individual may be the initial target to gain access to far reaching information, data or resources, privately or publicly. It can dismantle capability of a website or it can disrupt the power supply to a rural village.

Great Information War

Great Information War 5

Russia has been a key player in cyberattacks over the last two decades with hacking collectives making waves through ransomware, spyware and data theft. According to Forbes earlier this month, 60% of cyberattacks were linked to state actors affiliated with Russia. If Russia wants to fight using cybertechnology they certainly have the means, workforce and intelligence.