The Voice of Cyberยฎ
News & Thoughts
Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.
Deep Dive Articles
Five Ways to Identify Phishing Emails
As phishing emails come in different shapes and formats, there is no silver bullet to identify a phishing email. However, there is a collection of red flags you should be looking for before clicking on a new message. Here is our up-to-date guide to help you recognise the latest email-based scams.
What is phishing? Phishing is a cyber-attack typically ...
Why multi-factor authentication on the PEXA platform leaves security concerns
We published an article yesterday explaining why we seeย problems with the newly-introduced multi-factor authentication security measure on the PEXA electronic conveyancing platform.
As a response to the growing number of conveyancing scams, such as theย highly-publicised case involving the former MasterChef contestant, PEXA decided to introduce 2FA to ...
How Abandoned Domain Names Pose a Major Cyber Risk to Your Business
Iron Bastionโs cybersecurity expert Gabor Szathmari, recently published novelย research on abandoned internet domains, and how they are a significant cyber risk which threatens businesses and in particular the Australian legal profession.
What is an Abandoned Domain Name?
A domain name is a name you can register to identify your business on the ...
The Alphabet of Electronic Conveyancing
ARNECC, ELN, ELNO, ECNL, PEXA...
Aย recent cyber-attack incidentย against a property settlement transaction processed through the PEXA network has raised concerns over the transition from the traditional paper-based settlement process to electronic conveyancing. A number of cyberย security experts have expressed their concernsย about the cyber security ...
Why You Need Professional Email Hosting for Your Business
Your business deserves a reliable, safe and secure email service provider so that you can focus on your clients and not have to worry about cyber attacks. Email is an essential service for every business. However, not all email service providers are created equal. Some email services are more susceptible to hacking and data loss than others. In this ...
How To Prevent Payment Redirection Fraud At Your Conveyancing Practice
Enforcing Two-factor Authentication (2FA) on your email service is a robust security measure that can prevent payment redirection fraud. In the following article, we demonstrate how you can enable this powerful security feature on your corporate email accounts hosted on Office 365 or G Suite. By making this simple change, you can reduce the chances of ...
How to Protect Your Legal Practice from Payment Redirection Fraud
This article is aimed at helping legal professionals who commonly provide payment instructions for trust accounts and other transactions over email. Providing payment instructions over email puts you at risk of payment redirection fraud. In this article, you will learn why Australian legal professionals are high-value targets for cybercriminals and why ...
Is Your Conveyancing Practice Secure From Hacking?
The recent media reports of fraud against conveyancing practices suggest that professionals should be taking measures for protecting their businesses from cyber attacks. Cybercriminals primarily rely on an email-based attack known as phishing to help commit payment redirection fraud. A recent Telstra Security Report found thatย the most common ...
In The News
Ping Identity Survey Reveals Urgent Need Among Australian Enterprises for Advanced Identity Protection in AI Era
Sydney, 1 May 2024 -- Ping Identity, a leading provider of seamless and secure digital experiences, today released the findings of its new survey, shedding light on the state of identity fraud prevention in todayโs AI-driven digital world.
The report, based on responses from 100 Australian IT decision makers and an additional 600 IT decision-makers ...
Sekuro Announces New Partnership With Dragos To Strengthen OT Capabilities
Rising attacks against Australian critical infrastructure drive demand for OT security
Infoblox Threat Intel Discovers Muddling Meerkat, a DNS Operation Controlling Chinaโs Great Firewall
Infoblox Inc., a leader in cloud networking and security services, today announced that its threat intel researchers, in collaboration with external researchers, have uncovered โMuddling Meerkatโ, a likely People's Republic of China (PRC) state actor with the ability to control the Great Firewall (GFW) of China, a system that censors and manipulates ...
Proofpoint: 59% of ASX 200 Companies at Risk of Email Fraud
Australian organisations lag behind global counterparts in basic email protection, Proofpoint analysis reveals
The Australian Organisations Looking to Generative AI to Boost Security Operations
AustralianSuper, Powerlink Queensland and TAL among the first organisations exploring Microsoftโs Copilot for Security to enhance defence capabilities
Fastly Recognised as a Gartnerยฎ Peer Insightsโข Customersโ Choice for Cloud Web Application and API Protection for Sixth Consecutive Year
SAN FRANCISCO โ April 29, 2024 โ Fastly, Inc. (NYSE: FSLY), a leader in global edge cloud platforms, today announced it was named a 2024 Gartnerยฎ Peer Insightsโข Customersโ Choice for Cloud Web Application and API Protection (WAAP) for the sixth consecutive year โ and the only vendor to be recognised for six years running.
Based on reviews from ...
Logicalis Australia Appoints John Griffin As Chief Technology Officer
Melbourne,โฏAustraliaโฏโ 29 April 2024:ย Logicalis Australia, a leading global technology services provider, has announced the appointment of John Griffin as chief technology officer (CTO) in a strategic move that underscores the organisation's commitment to innovation and excellence in the rapidly evolving IT landscape.
John brings a wealth of ...
Zscaler Introduces First of Its Kind Digital Experience Monitoring Copilot to Enable IT Support and Operations with AI
Zscaler Digital Experience (ZDX) Copilot effortlessly unlocks network, device, and application performance insights in real-time to help quickly resolve issues impacting end users
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
What We Do
KBI.Media is The Voice of Cyber.
We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..