Amanda-Jane Turner's Blog, page 2

June 18, 2021

Guest Post - Laura Jiew and Sean McIntyre from AusCERT - I got 99 problems but a vuln ain’t one


Thank you to AusCERT's Laura Jiew and Sean McIntyre for writing a guest post for the Demystify Cyber project. Cybercrime fighting is truly a team sport, and I am thrilled to have this contribution from AusCERT for the blog. The team at AusCERT have always been extremely supportive of me both professionally and with my personal projects. and volunteer work, and they are passionae about supporting the community and Nation to stand strong against cybercrime.  I recommend their blog for up to date c...
 •  0 comments  •  flag
Share on Twitter
Published on June 18, 2021 13:00

June 12, 2021

Guest Post - Ross Marston - #Business cyber demystified

Thank you to Ross Marston, founder of Business Intelligence Security, for writing the below article about cybersecurity for businesses. 

.........

I’m lucky enough to get to talk to a lot of different business leaders, and I get it.  It’s daunting for many.  Particularly SME/SMBs . Most businesses are aware that cyber security has the potential to massively damage their business.  The evidence is in the news daily.  And you think to yourself, “well if they got hit, what hope do we have?”. Well, I’...

 •  0 comments  •  flag
Share on Twitter
Published on June 12, 2021 01:17

June 8, 2021

Guest Post - Greg Sawyer - #Cybersecurity - The low hanging fruit is your best first step

Thank you to Greg Sawyer, Director of the CAUDIT Cybersecurity Program, for writing the below article about cybersecurity practices in a home environment. Protecting our families from cybercrime is important, and this article provides good advice on how to do this.

.........

The low hanging fruit is your best first stepBeing a parent and bringing kids up in digitally connected world can seem daunting. They are increasingly expanding their connections to the digital world and wanting increasing a...
 •  0 comments  •  flag
Share on Twitter
Published on June 08, 2021 18:10

June 6, 2021

#Cybercrime - cryptojacking

Have you heard of all that virtual currency called cryptocurrency?  There seems to be a new one everyday! It started with Bitcoin in 2009, and in 2021 according to Investopedia * there are more than 4000. Below is a list of the five that seem to be more publically known. 

Bitcoin (launched 2009)Litecoin ( launched 2011)Dogecoin (launched 2013)Monero (2014)Ethereum (launched 2015)

Cryptocurrency transactions and verification involve complex calculations using a lot of computer power.  People can al...

 •  0 comments  •  flag
Share on Twitter
Published on June 06, 2021 00:04

May 30, 2021

#Cybersecurity - three ways malware can gain persistence

The purpose of the Demystify Cyber project, is to bring cybersecurity and cybercrime awarenss to all users of technology. Part of that includes explaining terms commonly used by cybersecurity practitioners, that may seem a little myserious to everybody else. Given that cybercrime can impact anyone cybersecurity should not be kept a mystery.

Let's look at malware persistence

When a criminal has taken all that effort to get some nasty piece of malware on your computer, they want it to stay there an...

 •  0 comments  •  flag
Share on Twitter
Published on May 30, 2021 23:41

May 21, 2021

#Ransomware - Brief guide to response

Following on from my short article on protecting yourself from ransomware, this post is a very brief overview of points to consider when formulating a response plan to a ransomware incident.
In ransomware events, prompt containment is critical and staying calm and following the pre-agreed steps your business has is essential. Communication should be done in parallel to response, and must be timely, relevant, and to the appropriate stakeholders. Different personnel and teams would be actioning t...
 •  0 comments  •  flag
Share on Twitter
Published on May 21, 2021 05:00

May 17, 2021

#ransomware - protect yourselves

Ransomware is a type of malware that is designed to, in very general terms, deny you access to your computer and files by other locking or encrypting them. The malware includes a pop up screen with instruction on how to pay the ransom to have the files unlocked/decrypted.

There are currently two main types of ransomware, locker and crypto. Locker ransomware aims to lock you out of your computer and its functions, but the malware permits some access so you can interact wth the ransom message. This...

 •  0 comments  •  flag
Share on Twitter
Published on May 17, 2021 01:15

May 7, 2021

Where to go for help

If you are impacted by cybercrime or want more information about cybersecurity please have a look at the resources below.
Australia

AusCERT www.auscert.org.auACSC  www.cyber.gov.au/Report cybercrime www.cyber.gov.au/reportIdentity theft support  www.idcare.orgCyber safety information www.staysmartonline.gov.au/Australian Privacy Commissioner www.oaic.gov.au/Scam Watch www.scamwatch.gov.aueSafety commissioner www.esafety.gov.auThink U Know www.thinkuknow.org.auAFP  www.afp.gov.auHave I been Pwned H...
 •  0 comments  •  flag
Share on Twitter
Published on May 07, 2021 00:40

May 6, 2021

Cybersecurity Conference - #AusCERT 2021 goes hybrid

 AusCERT, Australia's pioneer cyber emergency response team, has its twentieth conference in May 2021.

blue background stylised image of earth with Australian the middle white font ' AusCERT 2021 cyebrsecurity conference' in purple font '20th year'

Not letting the uncertainties of a global pandemic stop them, the team at AusCERT have created a hybrid delivery for the 2021 conference.

I will be attending virtually, as will some members of my team, we are thrilled to be able to attend without phsyically being there and hope to see hybrid conferences such as this continue way past the uncertain times of the pandemic.

The twentieth AusCERT confe...

 •  0 comments  •  flag
Share on Twitter
Published on May 06, 2021 16:28

October 23, 2020

#Phishing - Microsoft Teams

 #Cybercrime - beware of spoofed Microsoft Teams emails. Similar to the recent spate of Dropbox phishing that appear to be form a colleague sending a file via Dropbox, these emails look like a notification from a colleague via Teams and request the recipient to log in via the supplied link to see the message. The link/s in the message goto a #phishing page made to look like a Microsoft Teams log in page. These phishing emails are designed to obtain Microsoft log in credentials.

** What can you do...
 •  0 comments  •  flag
Share on Twitter
Published on October 23, 2020 23:20