Data Breach Alert: Qantas Users’ Information Compromised by Hackers In a disturbing turn of …
digital threats
-
-
3D printing technologyAI in CybersecurityElderly Care
The ZoraSafe app wants to protect older people online and will present at TechCrunch Disrupt 2025
by Samantha Rowland 2 minutes readIn the ever-evolving landscape of digital threats, safeguarding online security has become paramount, especially …
-
AI in CybersecurityAppliances and Electronics
Computer mice can eavesdrop on private conversations, researchers discover
by Samantha Rowland 2 minutes readIn a startling revelation, researchers from the University of California, Irvine, have uncovered a …
-
3D printing technologyAppliances and Electronics
Computer mice can eavesdrop on private conversations, researchers discover
by Jamal Richaqrds 2 minutes readIn a startling revelation, researchers from the University of California, Irvine, have unveiled a …
-
AI in CybersecurityHealthcare IT SecurityWebinars
Step Into the Password Graveyard… If You Dare (and Join the Live Session)
by Lila Hernandez 2 minutes readStep Into the Password Graveyard… If You Dare (and Join the Live Session) Every …
-
AI in CybersecurityGovernment IT ServicesMergers and Acquisitions
Cyber-first services provider Ekco continues acquisition trail with UK’s Solsoft
by David Chenby David Chen 2 minutes readIn a bold move to fortify its position in the cybersecurity realm, Dublin-based Ekco …
-
Cybersecurity in RetailFitness & Sports Retail
For One NFL Team, Tackling Cyber Threats Is Basic Defense
by Jamal Richaqrds 2 minutes readIn today’s digital landscape, where cyber threats loom large over organizations of all sizes …
-
AI and Machine Learning in Automotive IndustryAI in CybersecurityGovernment Intervention in Tech Industry
UK government bails out Jaguar Land Rover with £1.5B loan after hack disrupts vehicle production for weeks
by Lila Hernandez 2 minutes readIn a bold move, the UK government has stepped in to bail out Jaguar …
-
AI in CybersecurityComputer Hardware
Attackers Use Phony GitHub Pages to Deliver Mac Malware
by Samantha Rowland 2 minutes readIn a recent alarming development, threat actors have employed a sophisticated tactic to target …
-
Australia’s tech landscape has become a breeding ground for innovative cybersecurity startups tackling the …