The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

The Alphabet of Electronic Conveyancing

The Alphabet of Electronic Conveyancing

ARNECC, ELN, ELNO, ECNL, PEXA... A recent cyber-attack incident against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyber security experts have expressed their concerns about the cyber security ...

Why You Need Professional Email Hosting for Your Business

Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...

How To Prevent Payment Redirection Fraud At Your Conveyancing Practice

Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...

How to Protect Your Legal Practice from Payment Redirection Fraud

This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?

Is Your Conveyancing Practice Secure From Hacking?

The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found that the most common ...
Cheap Shots are taking Creep Shots of Women

Cheap Shots are taking Creep Shots of Women

Do you ever get that feeling that’s someone is watching you, or you are being followed? It freaks me out. Now, how do you feel when some random person has taken a photo of you? Well, sometimes you can never be too sure about what the case is. But, what happens when the creep shots take cheap shots? Yep, a whole new level we are heading to. What is ...
Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

Australian Companies Urged to Consider Pros and Cons of Paying a Ransom

The conversation is becoming more commonplace about whether companies should pay in a ransomware attack. Unfortunately, these crippling cyber-assaults are taking place too frequently across the globe, with targets and outcomes getting more consequential and more threatening for our workforce and communities. Cyber-criminals and other nefarious actors ...
A Scam Which Preys on Vulnerable People (and Works!)

A Scam Which Preys on Vulnerable People (and Works!)

This phishing campaign is a prime example of how heartless cybercriminals prey on vulnerable people. Our experts have been made aware of a new email extortion scheme targeting Australians. The email suggests that a backdoor has been installed on the victim's computer and the user was caught red-handed while pleasuring him or herself. The scammers then ...

In The News

CrowdStrike to Acquire Flow Security to Expand Its Cloud Security Leadership with Data Security Posture Management (DSPM)

CrowdStrike to Acquire Flow Security to Expand Its Cloud Security Leadership with Data Security Posture Management (DSPM)

CrowdStrike redefines modern data security with the unified platform that protects data at rest and in motion as it flows through the cloud, on-premise and within applications
Dell Technologies and CrowdStrike Expand Partnership Delivering Comprehensive Managed Detection and Response

Dell Technologies and CrowdStrike Expand Partnership Delivering Comprehensive Managed Detection and Response

Dell MDR service is now available with the AI-native CrowdStrike Falcon® XDR Platform, delivering the speed, expertise and flexibility customers need to respond to threats
LogRhythm Promotes Joanne Wong to Interim Chief Marketing Officer

LogRhythm Promotes Joanne Wong to Interim Chief Marketing Officer

A pioneer of LogRhythm’s Asia Pacific operations, Joanne Wong’s appointment reinforces LogRhythm’s commitment to employee advancement through strategic internal promotions.
Absolute Cyber Resilience Capabilities Earn Leadership Position in Frost & Sullivan Endpoint Security Radar

Absolute Cyber Resilience Capabilities Earn Leadership Position in Frost & Sullivan Endpoint Security Radar

Leading Industry Report Guides Global Organisations on How To Make Effective Cybersecurity Investments
Tenth Annual Logicalis CIO Report 2024 Finds 63 Per Cent Of Australian Cios Prioritise Artificial Intelligence

Tenth Annual Logicalis CIO Report 2024 Finds 63 Per Cent Of Australian Cios Prioritise Artificial Intelligence

Melbourne, Australia – 05 March 2024: Logicalis, a leading global technology services provider, has released the tenth edition of its annual CIO Report, revealing that artificial intelligence (AI), sustainability, and cybersecurity remain top priorities for business leaders across Australia and the globe.   According to the research, which surveyed ...
41 Million Tons CO2 Emissions Avoided Through TeamViewer Software Usage In A Year, Study Estimates

41 Million Tons CO2 Emissions Avoided Through TeamViewer Software Usage In A Year, Study Estimates

TeamViewer’s remote connectivity solutions have a substantial positive environmental impact, according to a recently finalised study conducted by Five Glaciers Consulting and critically reviewed by TÜV SÜD. The CO2-avoidance-study revealed that TeamViewer users and customers avoided between 15.6 and 44.8 million tons of CO2 emissions in 2022 alone, ...
ManageEngine Joins Forces with Check Point to Tackle Rising Mobile Threats 

ManageEngine Joins Forces with Check Point to Tackle Rising Mobile Threats 

Integration Bolsters ManageEngine's Endpoint Protection Platform, Enhancing Overall Cybersecurity Posture
Tenable Introduces Groundbreaking Visibility Across IT, OT and IoT Domains to Fully Illuminate Attack Vectors and Risks

Tenable Introduces Groundbreaking Visibility Across IT, OT and IoT Domains to Fully Illuminate Attack Vectors and Risks

Tenable One Exposure Management Platform integrates Tenable OT Security solution to analyse all risk across enterprise and critical infrastructure environments, regardless of asset type

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This