Cybersecurity Threats | Industrial IoT Vulnerabilities | SMS Phishing Campaigns Industrial cellular routers in Australia exploited for smishing attacks
Facial Recognition Technology | Fraud Detection | Privacy Breach Kmart Australia’s implementation of facial recognition technology violated privacy protections
Mobile | Telecommunications 91% of Australian Teens Have a Phone – But Many Aren’t Protecting Their Identity and Location
Australia | Cybersecurity | Infographics Malicious Cyber Activity in Australia (ACSC / ASD Report 2022–23)
Espionage Eavesdroppers, Code Breakers, and Digital Snoops: Inside Australia’s Secret Intelligence Branch
Australia | Cybercrime | Dark Web | Data Leaks Protecting Your Tax Refunds: How Easy Identity Changes Are Being Exploited
Australia | Cybersecurity | Government Australia’s Cybersecurity Strategy: Moving from Reaction to Resilience
Australia | Cybersecurity | Hacking | Healthcare Medibank Breach Sparks Ransom Debate: What Really Happens When Hackers Demand Money?
Australia | Cyberwarfare | Defence | Military | REDSPICE Australia Strengthens Cyber Defense with Bold New Investment