Our Cyber Security Blog

Our Cyber Security Blog 1
covid-19

Love Scams

Even before Covid, Scamwatch had reported that 1 in 5 scams were ‘dating and romance scams’. They have a full list of what to watch for and horror stories relating to online scams relating to dating sites but single women in later years have been particularly isolated these last 2 years and are crying out for companionship and connection. Scammers have gone so far as to employ actors to play a boyfriend role, create fake social media profiles and entice online daters with elaborate stories to build a connection before asking for thousands of $$ for fake needs or services.

Our Cyber Security Blog 2
Uncategorized

After hacks

We trace these stories and report on them in the early days, as it happens or as it is reported in mainstream media but rarely do we get the opportunity to follow up what actually happened following an investigation. The collection of stories relating to government services being compromised or big business going off line until further notice is astounding.

Our Cyber Security Blog 3
Business

Hop, Skip…Digital ID

A single digital identification aligned with government services and beyond is an opt-in system. You don’t have to have a digital identity to access the services, you might in the future though. If the government had a better track record on data privacy then maybe there wouldn’t be such a backlash but there are things that have happened throughout the pandemic that have made government services almost impossible to access any other way than online, 5km movement restriction, anyone?

Our Cyber Security Blog 4
Business

Frontline engineering

Diving into a lesson in social engineering gave me some understanding of the way we use language to hide what’s really happening. It seems the most basic definition of social engineering is the manipulation by a hacker of a business insider to reveal data that would otherwise be safe, secure and private to that business.

Our Cyber Security Blog 6
Security

Radical homebody

An edited excerpt from a new book by investigative journalist Huib Modderkolk called There’s a War On But No One Can See It delves into the story of Edwin and his parents in Rotterdam. Edwin grew up introverted and came to be the kid that spent 12 hours a day in his room tinkering with a home built PC. He roamed the darkest corners of computer servers with barely a torch. The inner motivation and obsession to find the next “window open,” an exploit that would allow unlimited access to some of the most important servers and corporate digital back rooms in the world.

Our Cyber Security Blog 7
cyber fit

Phone phishing

Phishing texts are requesting the same information from a phone user that they asked for on email. The difference is that if you click on a suspect link on your phone it can download a screening tool that extracts private information direct from your phone, including your whereabouts via GPS and other forms of identity theft. Phishing is a serious crime that often comes with financial and safety implications for the unsuspecting, fooled victim.

Our Cyber Security Blog 8
Government

Ticket to ride

This certificate was my ticket out of lockdown and into bars, clubs, events and houses, whenever restrictions are lifted. A literal ticket to travel. A ticket that protects me from serious disease and admission to hospital. There have been 5.86 billion doses of vaccines administered at the time of writing, worldwide 15.4% are fully vaccinated. Lockdown fatigue and declining mental health is real and both factors are leading governments around the world to lean heavily on vaccination rates of 70 – 80% of adult populations to ease restrictions.

Our Cyber Security Blog 9
covid-19

Bieber for the brain (or not)

In the story of “How music affects your brain and body” Jessica discovered a song that unexpectedly helped her to relax, it was Justin Bieber and she said she’s not normally a fan and she was a little embarrassed. She never would have chosen it for herself but it actually gave her all the feels.