Our Cyber Security Blog

Our Cyber Security Blog 1
Uncategorized

Copy mine/craft

The by-line of the post tells us that Gough is liberating the Minecraft ending from Microsoft as a gift to the universe. He unravels the story slowly and deliberately, it’s a long read, like 55 mins long. Gough came to write the End Poem for Minecraft after answering a Twitter callout from a friend, he made while attending a gaming conference in Berlin some years before.

Our Cyber Security Blog 2
crytpocurrency

Cyber sense – 2022 Reflections pt. 2

Faster Networks compiled an analysis of 2022. If you haven’t read part 1, please do. Faster Networks put their best foot forward to understand cryptocurrency and the impacts it has had and, is having on the world at large. This burgeoning decentralised and dysregulated banking system isn’t just economic. Bitcoin mining is an energy intensive process creating its very own environmental issues from uncontrolled investment and emissions. What we believed would solve some of the hierarchical headaches of traditional banking just made us reach for stronger painkillers, as we watched Sam Bankman-Fried get arrested…

Our Cyber Security Blog 4
applications

In/effective altruism made us feel awful

Enter the case of MIT graduate, crypto-trader and heralded philanthropist, Sam Bankman-Fried (SBF). SBF, fairly recently, was the wealthiest person under 30, a classic media darling, gracing covers of Fortune and Forbes 400 as recently as August 2022. He had a real rapport with journalists, they say he was disarming with his swagger, casual clothing and Einstein dishevelled-ness. He was a formidable tech guru that fronted media, answered the questions and appeared impressive and relatable.

Our Cyber Security Blog 5
Big Tech

Elon, Elon, Elon

Twitter has been an explosive democracy for a while. What separates Twitter from other social media platforms is that independent creators have had a place to spruik their opinion and their work outward, far beyond their base: quickly and sometimes in real time, followed by review and debate. Journalists, politicians, authors, artists, musicians and everyday humans have had a place to share something no matter what side of politics, as long as the content was created within some fairly loose rules. Those rules were broken often and there were consequences, like when the then president, Donald Trump lost his Twitter account because he was found to incite violence on January 6th before the insurrection.

Our Cyber Security Blog 6
Business

Hacksville

We have witnessed the relentless ease with which data is being compromised, stolen, held to ransom, we are also trying to legislate digital theft, not from the dirty, baseless criminals stealing it but from the companies that allow it to happen. A long read in The Guardian titled Ransomware hunters: the self-taught tech geniuses fighting cybercrime discusses how ransomware is an efficient crime with little accountability. Even if you pinpoint and arrest the criminal, the damage is far-reaching and ubiquitous and can be traumatising to those that have had their identity stolen.

Our Cyber Security Blog 7
scams

Trust Me

What is lost in this self-talk however is that digital fraud is a sophisticated and relentless threat. Telstra’s chair, John Mullen, came out recently to admonish the Federal government ministers for undermining Optus’ claim that the cyberattack they recently endured was sophisticated.

But privacy and, the information collected about us before we even get to talk of a data breach, is used in so many ways and is a somewhat empty promise that companies make in order to get us to sign our data away.

Our Cyber Security Blog 8
Security

Telco incommunicado

Optus is deeply apologetic over the latest threat to their customers’ details following a significant cyberattack. The fallout to their customer base and to the security of private data is one of confusion and distrust. Customers were put on high alert early, to note any suspicious activity on their accounts and any notifications that could be asking for information from a source unknown or a fake account. Account holders were told to stay informed, complete a credit check, change Medicare details and apply for a new licence.

Our Cyber Security Blog 9
Artificial Intelligence

Machine Art

There are PhD papers being researched and published right now about AI art and its capabilities as an artistic force, there will be more on that soon. But, more importantly, there is a cross discipline pursuit to understand and navigate the data revolution of our time to create AI that is human-level.