Our Cyber Security Blog

Our Cyber Security Blog 1
Big Tech

Sweet Source

In an effort to find sources that we trust we can go down our very own rabbit hole of mis/information. How do we really know for sure that what we are reading has any foundation in truth or is merely an opportunity to further pump the confirmation bias that lays dormant but is forever hunting for a pat on the back.

Our Cyber Security Blog 2
Social Media

Thread-bare

The initial success of Threads is thanks to the genius marketing of Meta to use an existing database to tap into a new database that can be built with one click. Are we bored yet?

Our Cyber Security Blog 3
Artificial Intelligence

The Beatles’ Mastery

There is beauty to be found in technology, it’s not all bad. Before you jump to conclusions about where AI and creativity is headed, read this story about a new release by the ultimate analogue band, The Beatles.

Our Cyber Security Blog 4
Security

To pay or not to pay

When Medibank were cyber attacked last year millions of customers were affected but the financial fall out and punishment is not commensurate with the distress and loss faced by individuals grappling with identity fraud.

Our Cyber Security Blog 5
Artificial Intelligence

AI is triggering

AI is getting ahead of itself and herein lies some examples. Future Life Institute are attempting to rein in the speeding bullet train that is AI language models by asking big tech to take a pause. Will it make any difference?

Our Cyber Security Blog 6
Artificial Intelligence

AI, again

AI is bigger than us, so we need to put our thinking caps on and start figuring out the best way to harness it’s power for good while remaining skeptical. We need to sit with the enormity and imagine our futures with AI at the helm.

Our Cyber Security Blog 7
Scam Watch

Rocky breach

Random gifts arriving in the mail and reviews for goods and services that don’t belong under the name they were written. Personal fraud is part of a digital life but if this happens to you, report it, it helps us understand the financial and psychological damage. How can we possibly trace the source or keep track of the pervasiveness of cyber fraud. Have we managed to train ourselves to be cyber warriors in protection of our own data and therefore our privacy or is cyber fraud happening less?

Our Cyber Security Blog 8
applications

TikTok on the sly

TikTok is facing severe scrutiny from it’s biggest market. Does the Chinese government have unfettered access to TikTok data and is the government influencing content. Can we trust that the software does not have vulnerabilities that could pose a risk to content creators and users from opportunistic hackers.

Our Cyber Security Blog 9
Big Tech

AI brainwave

There is so much discourse around ChatGPT and whether or not it is the next obvious communication tool for humanity or a real hindrance for teachers who are genuinely worried if this will inhibit actual thinking and deliberation.