Is End to End Encryption Good or Bad?

Is End to End Encryption Good or Bad? There was the recent event where the new synchronisation feature to Google Authenticator was criticised by security researchers as not secure for use due to its lack of end to end encryption. Google responded the very next day...

Enable GitHub Private Vulnerability Reporting at Scale

GitHub recently announced that private vulnerability reporting is now generally available for enabling at scale. This functionality provides a way for security researchers to privately disclose security issues to the project’s maintainers without the risk of...

TAFE South Australia Suffers Data Breach

TAFE South Australia has revealed that it has suffered a data breach. 2,224 student identification records were impacted. The identification forms include driver’s licenses and passports used for enrolments prior to 2021. The organisation were first notified of...

Unmaintained WordPress Plugin Used to Compromise Website

Attackers are using the abandoned WordPress plugin, Eval PHP, to compromised websites by injecting stealthy backdoors. Eval PHP is an old legitimate WordPress plugin that allows site admins to embed executable PHP code on their website pages and posts. The plugin has...