Introduction The terms cyberwarfare and cyberterrorism are both used since the 1990s for describing adverse events in cyberspace. Even though the three-decade history of cyberwarfare and cyberterrorism, academic communities could not agree on a widely accepted definition of these terms and draw a clear line between the two types of cyber events.
Category: Security

Wireless (in)security in Canberra CBD
Due to the strict COVID-19 policies in Australia, the BSides Canberra hacker conference was back in mid-April 2021. My visit was a good excuse to take my pwnagotchi for a walk in Canberra, and draw some conclusions of the Wi-Fi security practices of the Australian capital city.
For those not familiar with the pwnagotchi project, it makes Wi-Fi password auditing fun again. A pwnagotchi device is essentially bettercap installed on a Pi Zero, allowing to capture Wi-Fi packets on the go. The captured Wi-Fi packets are automatically uploaded to third-party services, and then analysed to reveal weak wireless passwords (PSKs) of the nearby wireless access points.

3 Cyber Security Tips for Small Business Owners
How to keep your small business secure from cyber attacks? With the following three simple measures, you can quickly improve the risk profile of your company.

4 Business Benefits of Professional Email Services for SMBs
How your business can benefit from Office 365 and G Suite? Get more things done with the free add-ons and protect your business with the security features.

Owning Your Legal Practice’s Cybersecurity – MSPs and You
Law practices should be aware of the cyber risks associated with IT, as a security breach involve financial and reputational damages, and legal liabilities. Read what the six questions are that every legal professional should ask from their managed IT services provider to avoid a data breach.

How to Run Effective Security Awareness Training for your Organisation
Ever wondered how you can deliver security awareness training to staff in your organisation that they will love? In this article, we are revealing the techniques we find useful in our training sessions.