Piers reconnects with mathematician Dr Ian Storey and pro investor Guy West…
Tag: Security
Fallout Continues From Optus Hack
A massive cyber attack threatens the private data of 9.8 million current…
The Details Of Hacking (Part 1)
Piers is joined by Dr.Ian Storey, lecturer in information systems at the…
Microsoft Cuts Support For Windows 7 Leaving Millions Vulnerable
Software experts, including our own John Young, are urging Windows users to…
Do We Really Have To Use Google Search?
Though Google search, thanks to its sheer size, offers the best search…
Suspicionless Device Searches Ruled Illegal
In an important opinion on privacy at borders, US District Court Judge…
AI Drones Monitoring Music Festivals
The Eye in the Sky program, a drone surveillance system developed in…
Privacy Tested At Australian Borders
An Australian ex-pat was forced to reveal passwords and give Customs officials…
iPhone Security Called Into Question
Companies claiming to be able to crack iPhone security measures for law…
Hacking Attempt On Beyond Infinity
John explains what happened when thousands of attempts, possibly originating in the…
BlockOne Promises A Secure Version Of The Internet
Early investors in blockchain start-up Block.One stand to make 6,500% in 3…
Bluetooth Security Flaws
The wireless technology is incredibly useful and integrated into a host of…
The Future Of Blockchain After Bitcoin
Is blockchain, the technology that underpins Bitcoin and other crypto currrencies, just…
Latest CSIRO Funding For AI And Space
Australia’s national science agency is spending up on space technology and AI.…
The Defunct Google Plus Service Was Hacked In March 2018
Google Plus, Google’s failed social networking platform, suffered a significant security breach…
Audit Finds WA Government Agencies Vulnerable To Cyber Crime
The widespread use of weak or common passwords among the general public…
Unlock Your Phone Or Face 10 Years Jail
Tougher screening laws at airports in Australia mean you can be required…
App Developers Are Reading Your Gmail
Google engineers and third-party app developers are given permission to read the…
Trump White House Accused Of Breaching Data Security Protocols
While Trump’s use of the secret messaging service Confide may breach federal…
The Omnipresence Of Facial Recognition Technology
There are rising concerns over the unfettered use of the technology. How…
The Spectre And Meltdown Security Threats
A serious security flaw exists in the hardware at the heart of…
The Security Risks Of Quantum Computers
Next gen computers promise a paradigm shift in biotech, weather forecasting and…
Amazon Cloud Cam – Compact and User Friendly
This live-streaming security camera offers HD coverage, simple app control and free…
Massive Bluetooth Security Flaw Announced
The BlueBorne vulnerability could affect 8 billion devices around the world leaving…
How To Monitor Encrypted Communications
Governments want access to WhatsApp and other encrypted messaging technologies that have…
Best Practice To Avoid Ransomware Infection
At a time of increasing concern over cyber crime, we talk with…
Major RansomWare WorldWide Attack #WannaCry
A sophisticated worm is attacking Windows machines globally, possibly the largest in…
Your Vital Need To Understand Terms Of Service
If you started using PayPal when you were under 18, you could…
Vulnerability Of Small Business To Cyber Attack
A US report finds 60% of small companies that get hacked are…
IT Consulting To Corporates And Governments
Part 1 of an interview with Andrew Ferguson of KuppingerCole. Andrew backgrounds…
500m Yahoo Accounts Hacked
Users advised to reset passwords, but no credit card payment information stolen.…
Australian Census Debacle
Cost-cutting and poor planning to blame for the worst census ever conducted…
Weekly News From Beyond Infinity 07/06/16
Our weekly news round-up: 10,000 Aussies done in AGL ransomware scam; Irongate…
Dr. Ian Storey On Hacking And Risk Management
In the second of 3 interviews, we delve into the growing threat…
First Ransomware Mac Attack
The first fully-functional ransomeware surfaces on the OS X platform.
Dreaded ‘Error 53’ Message Resolved
Apple bows to customer pressure with an iOS update to address instances…
Apple Vs The FBI
To help with a US terror investigation, the FBI demands that Apple…
Bureau Of Meteorology Suffers Massive Hack
Australia’s BoM gets hacked, possibly by the Chinese. The vulnerability will take…
Ethical Hacking
Startup Zerodium awards $1 million to hackers who found security vulnerabilities in…
LogMeIn Buys LastPass
John Young explains the benefits of using the LastPass password management tool…
Total Recall, Starring VW
The VW emissions scandal highlights fundamental software and compliance issues facing the…
Reset the Net Privacy Initiative
Mass surveillance by governments has prompted many large internet companies to form…
Government Data Retention Policies Debated
Sir Tim Berners-Lee, the inventor of the world wide web, says there…