Aug 11, 2023 | Podcast
How do you measure productivity of remote workers? For one company, productivity is measure by having more than 500 keystrokes on the computers every hour. In a rare case for Australia, an employee had been terminated for not meeting the required productivity levels....
Aug 10, 2023 | Podcast
How are malicious apps getting pass Google Play Store’s review process and their rigorous PHA (Potentially Harmful Application) screening? Well, they’re using a technique called versioning which is sneaky and hard to detect. The attackers would first...
Aug 9, 2023 | Podcast
Academic researchers from British universities have developed a deep learning side channel attack that can be used to steal data from keyboard strokes that are recorded using a microphone with an accuracy of 95%. The audio can be recorded from a nearby microphone, or...
Aug 8, 2023 | Podcast
A number of cybersecurity agencies have co-authored a joint Cybersecurity Advisory (CSA) on frequently exploited vulnerabilities in 2022. The advisory provided details on CVEs routinely and frequently exploited by cyber criminals. The agencies included: United States:...
Aug 7, 2023 | Podcast
Cyber criminals have scammed the Australian Tax Office of more than half a billion dollars. They have done so by exploiting a weakness in the identification system used by the myGov online portal. The weakness allows them to redirect other people’s tax refund to...
Aug 4, 2023 | Podcast
A senate committee investigating interference in Australia by foreign powers through social media have released a report this week which found that TikTok and WeChat could be the country’s biggest security risks. The report made 17 recommendations, including...