Actions to take when the cyber threat is heightened

Actions to take when the cyber threat is heightened Summary The National Cyber Security Centre explains how organisations should respond when the cyber threat increases. The guidance urges establishing a balance between acceptable risk and defensive measures, and focuses on practical, high-priority actions that can be completed quickly to reduce vulnerability and limit impact. Key […]

Read More →

Social Media: how to use it safely

Social Media: how to use it safely Summary The National Cyber Security Centre (NCSC) provides clear, practical advice on managing privacy and security across major social media platforms. The guidance covers platform-specific privacy settings, the importance of two-step verification (2SV), how to be aware of your digital footprint, spotting and reporting fake or hacked accounts, […]

Read More →

Buying, selling and donating second-hand devices

Buying, selling and donating second-hand devices Author style Punchy: a practical, no-nonsense guide you should follow if you own a phone or any connected gadget. This is straightforward but important — skimming might save time now, but missing steps can cost you later. Summary Devices, especially smartphones, hold a lot of personal, work and financial […]

Read More →

US spy chief says UK drops Apple backdoor demand | Cyber attack exposes details of thousands of internet provider iiNet’s customers | Nvidia developing more powerful Blackwell-based AI chip for China

US spy chief says UK drops Apple backdoor demand | Cyber attack exposes details of thousands of internet provider iiNet’s customers | Nvidia developing more powerful Blackwell-based AI chip for China Summary This Daily Cyber & Tech Digest bundles three high-impact stories. First, the US Director of National Intelligence Tulsi Gabbard says Britain has dropped […]

Read More →

Hackers accessed 850,000 Orange Belgium customer accounts | North Korea-linked hackers target embassies in Seoul in new espionage campaign | Aussie workers sceptical of AI coming for their jobs

Hackers accessed 850,000 Orange Belgium customer accounts | North Korea-linked hackers target embassies in Seoul in new espionage campaign | Aussie workers sceptical of AI coming for their jobs Summary This digest bundles three notable technology and security stories. First, Orange Belgium confirmed hackers accessed data from 850,000 customer accounts in yet another major breach […]

Read More →

China’s Great Firewall cuts global access for an hour | 493 child sextortion cases linked to scam compounds | Australian trade union council strikes deal on AI copyright payments

China’s Great Firewall cuts global access for an hour | 493 child sextortion cases linked to scam compounds | Australian trade union council strikes deal on AI copyright payments Summary For roughly one hour in the early hours of Wednesday, China effectively cut nearly all HTTPS traffic (TCP port 443) to the outside world, according […]

Read More →

US blocks Five Eyes from Ukraine peace talk | Africa cybercrime crackdown | Australia orders Binance money laundering audit

US blocks Five Eyes from Ukraine peace talk | Africa cybercrime crackdown | Australia orders Binance money laundering audit Summary The US Director of National Intelligence, Tulsi Gabbard, has withheld updates on Russia–Ukraine peace talks from Five Eyes partners — a dramatic departure from long-standing intelligence cooperation and the latest sign of strained sharing under […]

Read More →

NEW ASPI REPORT: Hyperscale cloud and shared security in the Indo-Pacific: Views from The Strategist | Pentagon: U.S. use AI to suppress dissent | Nationalist AI videos inundate Chinese social media

NEW ASPI REPORT: Hyperscale cloud and shared security in the Indo-Pacific: Views from The Strategist | Pentagon: U.S. use AI to suppress dissent | Nationalist AI videos inundate Chinese social media Summary This Daily Cyber & Tech Digest from ASPI bundles several major stories: an ASPI collection on hyperscale cloud and shared security in the […]

Read More →