NSA Best Practices for Securing Your Home Network

The NSA has released a cybersecurity information sheet on best practices for securing your home network. They provide recommendations for device security and for online behaviour. Some of those recommendations include upgrading and updating all equipment and software...
Guest Lecture at UNSW

Guest Lecture at UNSW

Had the fantastic opportunity this evening to guest lecture at UNSW (University of New South Wales) to tomorrow’s software engineers and leaders. I shared the importance of cyber security in Software Design and Development, and provided some approaches and best...

10 Signs You’re Being Scammed

Do you know how to spot a scammer? Well Phil Muncaster from We Live Security has provided 10 signs to watch out for that should set your alarm bells ringing. They are: #1 The message is unsolicited. #2 They call you out of the blue. #3 You’re being rushed into...

GitHub CoPilot AI Model Helping Secure Code

GitHub has started rolling out a new AI model which helps identify insecure coding patterns. As part of the new security vulnerability filtering system, Copilot will help identify and block insecure code such as hardcoded credentials, path injections and SQL...

GoDaddy Multi Year Security Breach

The web hosting provider GoDaddy recently announced that they had suffered a security breach. This incident, which was reported by customers in early December last year, redirected sites hosted on GoDaddy to random domains. GoDaddy believed that the incident is linked...
The State of Software Supply Chain is looking … bleak

The State of Software Supply Chain is looking … bleak

Had a great time today at the CISO Sydney event. I did a joint presentation Justin where we went though the stats in the 8th Annual State of Software Supply Chain Report and I provided my insights and perspective. Some of the key findings from the report that I...

Is Your Smart Speaker Eavesdropping?

Jake Moore from WeLiveSecurity wrote an article about him helping a friend who thought she might have been hacked by her Ex-partner. This is because the Ex knew specific information about her private conversations. Eventually it was discovered that the Ex was using...

Update Your Apple Devices

Apple has released emergency security updates earlier this week for it’s iPhone, iPads and Macs. The updates fixes a WebKit issue that could result in code execution. This is a vulnerability that is actively exploited in the wild. The fixed versions are 13.2.1...

Online Stores are Leaking private data

According to research by website security company, Sansec, around 12% of online stores have their backups exposed due to human error or negligence. In a study of 2,036 stores of various sizes, 250 of them were found to have stored their backups files on publicly...

Fake Job Ads to steal data from Applicants

Trend Micro recently discovered an active campaign that uses a fake employment  pretext to steal information from applicants. The ads are crafted to target Eastern Europeans working in the cryptocurrency industry. An executable disguised as a word document is...