
Cyber crime classes at the Institute of Applied Technology in Meadowbank
Like a battlefield with moving boundaries, the fight to keep our data safe is constantly And for the first time in Australia, a cyber training school in Sydney is preparing students for the fight ahead to keep…

Reddit data breach – should users be concerned?
We talk about a significant Reddit hack this On February 5th, Reddit was compromised following a successful phishing What what happened during the security breach on Reddit? What effects will the Reddit breach have on users’ data?…

Pepsi Data Breach
During a malware assault, Pepsi Bottling Ventures experiences a data When news of the company’s plans to compensate clients for the stolen data The list of stolen data is extensive and Depending on the individual, it…

Hackers Target US Telecom: AT&T, T-Mobile & Verizon
Hackers are targeting US telecom companies, and AT&T, T-Mobile and Verizon are among the companies that have been hit Hackers have been targeting US telecom companies in a large-scale espionage attack, and the results have been

The Use of Artificial Intelligence in Cybersecurity
Cybersecurity is a challenging field with hackers constantly changing their However, the basic security best practices remain the same for a long Using AI for cybersecurity can reduce the error rates in your network and prevent them from…

League of Legends breach: Hackers blackmail Riot Games
League of Legends, one of the world’s most popular video games, was recently the target of a security Hackers were able to gain access to Riot Games’ internal systems and steal source code for the The hackers…

A Look At Cyber Security News 2023-01-21
The world of cyber security is constantly changing, and it’s important to stay up to date on the latest Recently, Ukraine’s cybersecurity agency reported that cyber-attacks have tripled in the past This is a stark reminder of the…

Hackers Breached Norton Password Manager
Norton LifeLock recently reported that nearly one million active and inactive accounts were targeted in a credential stuffing Credential stuffing is a type of cyberattack where hackers use automated attempts to guess passwords from stolen or leaked…

Cybersecurity for beginners: 10 terms you should know
If you’re interested in entering the exciting world of cybersecurity, but don’t know where to start, acquiring a vocabulary base is To help get you up to speed, here is a brief overview of ten key terms…