Blogs

Exploring the World of IT Management.

computer support professionals
IT & Technology Solutions

LinkedIn sued over allegation it secretly reads Apple users’ clipboard content

Microsoft’s linkedIn faced a lawsuit from a New York-based iPhone user on Friday. The user accused of reading ...

computer support professionals
IT & Technology Solutions

Australian privacy watchdog launches investigation into Clearview AI

Australia’s privacy watchdog will investigate how Clearview AI handles personal data after several police agen...

computer support professionals
Managed IT Services

NSW govt sets up vulnerability tracking centre in Bathurst

The NSW government has set up a cyber security vulnerability management centre in Bathurst, which will start o...

COVIDSafe
Communication & Collaboration

COVIDSafe was ‘sunscreen’ for coronavirus, until it wasn’t. Have we chosen the right solution to the pandemic?

When it launched, COVIDSafe was marketed as Australia’s ticket out of lockdown, so long as everyone down...

Australian government
IT & Technology Solutions

Australian government and companies targeted by a sophisticated state-based actor

What’s happened? The Australian Government is aware of and responding to, a sustained targeting of Australian ...

computer support professionals
Communication & Collaboration

Spying on users of Google’s Chrome shows new security weakness

A newly discovered spyware campaign targeted users through 32 million downloads of extensions from Google&#821...

computer support professionals
IT & Technology Solutions

Google and Apple release technology to help with COVID-19 contact tracing

A new technology could soon alert people if they have been in close contact with someone who has COVID-19. It ...

computer support professionals
IT & Technology Solutions

Why COVIDSafe hasn’t helped, yet.

The Australian Government launched COVIDSafe on April 26, promoting it as essential for lifting lockdown restr...

Laptop open on desk with Thunderbolt cable attached, symbolizing security vulnerabilities in Thunderbolt ports
Digital Marketing & Creative

Unfixable Thunderbolt flaws bypass computer access security

Björn Ruytenberg, a Dutch master’s student, discovered critical vulnerabilities in thunderbolt hardware. These...