Our Cyber Security Blog

Our Cyber Security Blog 1
Scam Watch

Rocky breach

Random gifts arriving in the mail and reviews for goods and services that don’t belong under the name they were written. Personal fraud is part of a digital life but if this happens to you, report it, it helps us understand the financial and psychological damage. How can we possibly trace the source or keep track of the pervasiveness of cyber fraud. Have we managed to train ourselves to be cyber warriors in protection of our own data and therefore our privacy or is cyber fraud happening less?

Our Cyber Security Blog 2

TikTok on the sly

TikTok is facing severe scrutiny from it’s biggest market. Does the Chinese government have unfettered access to TikTok data and is the government influencing content. Can we trust that the software does not have vulnerabilities that could pose a risk to content creators and users from opportunistic hackers.

Our Cyber Security Blog 3
Big Tech

AI brainwave

There is so much discourse around ChatGPT and whether or not it is the next obvious communication tool for humanity or a real hindrance for teachers who are genuinely worried if this will inhibit actual thinking and deliberation.

Our Cyber Security Blog 4

Copy mine/craft

The by-line of the post tells us that Gough is liberating the Minecraft ending from Microsoft as a gift to the universe. He unravels the story slowly and deliberately, it’s a long read, like 55 mins long. Gough came to write the End Poem for Minecraft after answering a Twitter callout from a friend, he made while attending a gaming conference in Berlin some years before.

Our Cyber Security Blog 5

Cyber sense – 2022 Reflections pt. 2

Faster Networks compiled an analysis of 2022. If you haven’t read part 1, please do. Faster Networks put their best foot forward to understand cryptocurrency and the impacts it has had and, is having on the world at large. This burgeoning decentralised and dysregulated banking system isn’t just economic. Bitcoin mining is an energy intensive process creating its very own environmental issues from uncontrolled investment and emissions. What we believed would solve some of the hierarchical headaches of traditional banking just made us reach for stronger painkillers, as we watched Sam Bankman-Fried get arrested…

Our Cyber Security Blog 7

In/effective altruism made us feel awful

Enter the case of MIT graduate, crypto-trader and heralded philanthropist, Sam Bankman-Fried (SBF). SBF, fairly recently, was the wealthiest person under 30, a classic media darling, gracing covers of Fortune and Forbes 400 as recently as August 2022. He had a real rapport with journalists, they say he was disarming with his swagger, casual clothing and Einstein dishevelled-ness. He was a formidable tech guru that fronted media, answered the questions and appeared impressive and relatable.

Our Cyber Security Blog 8
Big Tech

Elon, Elon, Elon

Twitter has been an explosive democracy for a while. What separates Twitter from other social media platforms is that independent creators have had a place to spruik their opinion and their work outward, far beyond their base: quickly and sometimes in real time, followed by review and debate. Journalists, politicians, authors, artists, musicians and everyday humans have had a place to share something no matter what side of politics, as long as the content was created within some fairly loose rules. Those rules were broken often and there were consequences, like when the then president, Donald Trump lost his Twitter account because he was found to incite violence on January 6th before the insurrection.

Our Cyber Security Blog 9


We have witnessed the relentless ease with which data is being compromised, stolen, held to ransom, we are also trying to legislate digital theft, not from the dirty, baseless criminals stealing it but from the companies that allow it to happen. A long read in The Guardian titled Ransomware hunters: the self-taught tech geniuses fighting cybercrime discusses how ransomware is an efficient crime with little accountability. Even if you pinpoint and arrest the criminal, the damage is far-reaching and ubiquitous and can be traumatising to those that have had their identity stolen.