Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Governments Can Mitigate AI-Powered Cyber Threats

Cybersecurity leaders across all levels of government are growing increasingly alarmed by the rise of cyber attacks fueled by Artificial Intelligence (AI). Cybercriminals are now incorporating machine learning and automation into their strategies, significantly boosting the scale, efficiency and sophistication of their attacks. According to a recent survey of over 800 IT leaders, a staggering 95% believe that cyber threats have become more advanced than ever before.

Random but Memorable - A Very (Artificial) Festive Special with Dr Erik Huffman

Welcome to A Very (Artificial) Festive Special! Join the podcast crew and special guest, Dr Erik Huffman, as we look back at an eventful year in cybersecurity. With artificial intelligence taking centre-stage, we serve up a platter of AI-powered games, news, and festivities.

How To Share Your WiFi Password Safely

You can share your WiFi password safely by using a strong password, creating a guest network, enabling your router’s encryption and regularly updating your router. Sharing your WiFi password safely is important because someone with bad intentions could use it to hack into your network, steal your personal information or infect your devices with malware.

How Can Someone Use My Credit Card Without Having It?

According to Experian, there have been approximately 416,000 reported cases of credit card fraud so far in 2024. Credit card fraud occurs when someone uses your credit card to make purchases without your permission by impersonating you. Someone can use your credit card without physical access by stealing your credit card number through credit card skimming, shoulder surfing, phishing and hacking.

How To Create a Secure Username

To create a secure username, you must ensure your username is random, does not use any of your personal information and is unique from your other usernames across all other websites. A secure username should contain a combination of random numbers and symbols, prioritizing safety and privacy by not revealing personal details.

Admin update: Create auto-lock, release channel, and 1Password browser extension rules

Every organization has its own team culture, processes, and security requirements. That’s why we’re continuously updating 1Password Enterprise Password Manager with new options that give you greater flexibility and granular control.

How To Know if Your Apple ID Is Hacked

Your Apple ID is valuable to hackers because, if compromised, someone could use it to access your sensitive accounts, important documents, private photos and more. Signs that your Apple ID may be hacked include receiving emails from Apple about a new login, being locked out of your Apple device or iCloud account, getting notifications of account changes or noticing unfamiliar charges from Apple on your bank statements.