In October 2022, the New York Post was hacked - namely its website and Twitter accounts were controlled by hackers so they could provide 'disturbing fake news' with spoofed and unflattering headlines and tweets targeting members of the the US parliament. The New York said that they are investigating the causes. It has long…
Read moreIn September 2022 Australian telecommunications giant Optus revealed about 10 million instances of data being stolen in what it called a cyber-attack. Some experts say it may be the worst data breach in Australia's history. This probable overseas cyber attack incited critical questions to be asked by consumers and Government ab…
Read moreHere is a powerpoint presentation on the OSI Model: "https://www.dropbox.com/scl/fi/afhlkulbbjaj19ibrgkg4/OSI-MODEL2.pptx?dl=0&rlkey=ygn7yvi6onbogbw0j5wieb3tz"
Read moreThere are some areas in the cyber world which are crimes which go back over the decades about how some of the original hacking crimes really started. "Web of Makebelieve - Death, Lies and the Internet" is a series on Netflix. This series, shares a number of stories and testimonies, mostly of cybercrimes in the USA. The …
Read moreIf you take a risk with one of the 50 most simplest passwords 95% of them will be able to be cracked within 1 second. If you add one symbol like #!@ you stretch out an opportunity to break it to a simple an hour and a half overall. Add two symbols and it could require just 4 days. They are broken utilizing readily accessible free or…
Read moreNetworks are groups of computers linked to each other with a cable or wireless connections. Networks are made up of nodes that communicate with each other to share information, and enable data transmission between devices The advantages are that they share data and resources. They are also a central control for programs and ca…
Read moreCC*CP state-sponsored Chinese attackers rely heavily on well-known but widely unpatched vulnerabilities to carry out their attacks. A US federal security agency warns that Chinese state-sponsored attackers are relying heavily on known but widely unpatched vulnerabilities to "create a large network of infected infrastructure.…
Read more1. Ransomware/ Ransomware-as-a-Service Ransomware attacks are a serious cyber threat. These attacks infect a victims network and holds their data and computer systems hostage until a ransom is paid. The immediate losses from the ransom are only the beginning. The economic damage from prolonged downtimes and disrupted operations are…
Read more****NEWS FLASH**** 19 November, 2022 Get the best and latest techniques to secure your systems here perhaps? https://www.sans.org/cyber-security-training-events/japan-november-2022/ 31 October, 2022 BIGGEST Roblox Halloween hacker is coming ...according to a Youtube video - no one seems to be taking th…
Read moreWiFi is a radio signal transmitted from a wireless router to a nearby device, which converts the signal into data that can be seen and used. The router receives a radio signal from the device, which connects to the internet via wire or cable. What exactly is a wireless network? A WiFi network is essentially an internet…
Read moreMan in the Middle (MiM) attacks are cyber attacks where an adversary/attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them. In the context of authentication, the attacker would be positioned to intercept and maliciously alter or inject data between claimer parties …
Read moreIf you are a Managed Service Provider (MSP), you may find that a crucial tool that you need might be an RMM Remote Monitoring and Management tool (or Network Management tool). It's a tool that makes the work of modern MSPs possible. It is a process designed to help MSPs remotely and proactively monitor client endpoints, compu…
Read moreThreat Report Findings for Managed Service providers in 2022 90% of malware is delivered via email, There is a 20% increase in the incidence rate of phishing attacks from the previous year, A managed service provider (MSP) delivers services, such as application, networks, infrastructure and security, via frequent support and act…
Read moreOverview of Windows OS since Windows 95 WINDOWS 95 ¡ Windows 98 provides a more exciting and satisfying multimedia and gaming experience by supporting the following capabilities and technologies: ¡ A few feature highlights • Watch TV on the computer. ... • Adding accessories. ... • Multiple Moni…
Read more