The Optus data breach counts among the worst cyber attacks in Australia. View the incident timeline and resources for affected customers.
Millions of Optus customers potentially exposed in massive data breach

The Optus data breach counts among the worst cyber attacks in Australia. View the incident timeline and resources for affected customers.
A mobile-targeted cyber espionage campaign dubbed ‘Dark Caracal’ has been uncovered by the Electronic Frontier Foundation and security firm Lookout. The scheme has been in operation since at least January 2012, affecting users in over 21 countries. EFF and Lookout have uncovered the actors of the scheme, stating that the campaign has been operated from
While most organisations in 2017 have adopted security programs that successfully defend against cyber attacks, malware can still infect networks by way of unexpected sources. Personal USB drives, phones and laptops are used to access repositories of company information, but many organisations have not conducted an IT security audit that evaluates the risks they pose.
Hot on the heels of the Mirai botnet of 2016 comes news of a new IoT malware, dubbed Hajime. As reported in Computerworld, Hajime is “like Mirai on steroids” with a more sophisticated method for command and control of compromised IoT devices based on a peer-to-peer network rather than a direct server connection. Estimates so
As reported in IT News, malware that has a very specific purpose has been found lurking in the Google Play store. It’s called Overseer, and it’s designed to target business travellers going overseas. It steals lots of information for a very specific purpose. Once installed on a user’s Android device, Overseer collects and sends back
Who? Me? As a Managed IT Service provider looking at the state of affairs in multi-stage chained attacks we can say this: if you want to be an effective hacker, take a persuasive writing course. That’s also the lesson delivered in a report last week by US-based Proofpoint, a leading Security-as-a-service vendor shows that automated