Airbnb Host Thrown in the Clink After Guest Finds Hidden Camera Inside Wi-Fi Router   An IT Security worker discovers a camera hidden in the Wi-Fi router.  Kieren McCarthy, The Register, May 2019

Airbnb Host Thrown in the Clink After Guest Finds Hidden Camera Inside Wi-Fi Router

An IT Security worker discovers a camera hidden in the Wi-Fi router.

Kieren McCarthy, The Register, May 2019

WhatsApp Points Finger at Israeli Firm over Hack   “The malware was able to penetrate phones using the app's voice calling function, with reports blaming the Israeli-based NSO Group.”  Sky News, May 2019

WhatsApp Points Finger at Israeli Firm over Hack

“The malware was able to penetrate phones using the app's voice calling function, with reports blaming the Israeli-based NSO Group.”

Sky News, May 2019

Teacher Who Sent Nudes to Students was ‘Lost, Lonely’   This article discusses a teacher using social media to send naked photos to a student while drunk, and re-iterates the challenges facing social media platforms and connection people digitally. It can create doorways that can be exploited by predators.  MSN News, March 2019

Teacher Who Sent Nudes to Students was ‘Lost, Lonely’

This article discusses a teacher using social media to send naked photos to a student while drunk, and re-iterates the challenges facing social media platforms and connection people digitally. It can create doorways that can be exploited by predators.

MSN News, March 2019

China’s Tech Giants are a Security Threat to the UK, says Brit Spy Bigwig   Times are strange when spies talk about infosec and economics colliding.  Gareth Corfield, The Register, Feb 2019

China’s Tech Giants are a Security Threat to the UK, says Brit Spy Bigwig

Times are strange when spies talk about infosec and economics colliding.

Gareth Corfield, The Register, Feb 2019

New Zealand Companies Caught Up in Huge Global Data Hack   Cyber security should never be ignored. Is your business protected?  Radio New Zealand, Jan 2019

New Zealand Companies Caught Up in Huge Global Data Hack

Cyber security should never be ignored. Is your business protected?

Radio New Zealand, Jan 2019

UK’s Best-Selling Cars Susceptible to Keyless Theft, Research Claims   Keyless thefts- also known as a relay attack- occur when a device is used to trick a car into thinking it’s key is within range, allowing thieves to start keyless cars.  Lucia Binding, Sky News, Jan 2019

UK’s Best-Selling Cars Susceptible to Keyless Theft, Research Claims

Keyless thefts- also known as a relay attack- occur when a device is used to trick a car into thinking it’s key is within range, allowing thieves to start keyless cars.

Lucia Binding, Sky News, Jan 2019

The Biggest Myth of Agile Development- Faster, Cheaper, and Better Outcome   Development tools such as Agile are not a magic solution for all problems, but is merely a guide on how to solve common problems.  Steven Koh, Jan 2019

The Biggest Myth of Agile Development- Faster, Cheaper, and Better Outcome

Development tools such as Agile are not a magic solution for all problems, but is merely a guide on how to solve common problems.

Steven Koh, Jan 2019

Movers and Shakers   Divina Paredes, CIO New Zealand, Jan 2019

Movers and Shakers

Divina Paredes, CIO New Zealand, Jan 2019

Lenovo Tells Asia-Pacific Staff: Work Lappy with your Unencrypted Data on it has Been Nicked   Yes it's a blunder from a manufacture of laptops. However, Lenovo may have a policy about not encrypting laptops. Encryption is good as it stops your data from being accessed, but one assumes, from bad people. However, staff turning sour are still the biggest threats to an organisation. If the laptop is encrypted, without the right process in place, it can make HR investigations near on impossible.  Paul Kunert, The Register, Dec 2018

Lenovo Tells Asia-Pacific Staff: Work Lappy with your Unencrypted Data on it has Been Nicked

Yes it's a blunder from a manufacture of laptops. However, Lenovo may have a policy about not encrypting laptops. Encryption is good as it stops your data from being accessed, but one assumes, from bad people. However, staff turning sour are still the biggest threats to an organisation. If the laptop is encrypted, without the right process in place, it can make HR investigations near on impossible.

Paul Kunert, The Register, Dec 2018

Here’s What the Big Tech Companies Know About You   Always topical; what information do tech companies like Google and Facebook know about their users?  Jeff Desjardins, Visual Capitalist, Nov 2018

Here’s What the Big Tech Companies Know About You

Always topical; what information do tech companies like Google and Facebook know about their users?

Jeff Desjardins, Visual Capitalist, Nov 2018

**This Article can only be read if you are logged into your LinkedIn account**   Forensic reporting closes the gap to your boardroom and informs the threat modelling process   Lewis Richards, Researcher for Cyber Toa (Nov 2017)

**This Article can only be read if you are logged into your LinkedIn account**

Forensic reporting closes the gap to your boardroom and informs the threat modelling process

Lewis Richards, Researcher for Cyber Toa (Nov 2017)

**This Article can only be read if you are logged into your LinkedIn account**   New Zealand organisations need to prepare for overseas and domestic data and privacy compliance requirements   Lewis Richards, Researcher for Cyber Toa (Nov 2017)

**This Article can only be read if you are logged into your LinkedIn account**

New Zealand organisations need to prepare for overseas and domestic data and privacy compliance requirements

Lewis Richards, Researcher for Cyber Toa (Nov 2017)

Security, honesty & the trust business   Mike Bullock, ANZ New Zealand (28 Sep 2017)

Security, honesty & the trust business

Mike Bullock, ANZ New Zealand (28 Sep 2017)

Have you been socially engineered recently?   Lewis Richards, Researcher for Cyber Toa (Aug 2017)

Have you been socially engineered recently?

Lewis Richards, Researcher for Cyber Toa (Aug 2017)


iStock-178101320.jpg