Cyber Security News


SMS S Cams 1
How to Avoid Getting Scammed by SMS in Australia
May 14, 2024 In recent years, Australia has seen a significant rise in SMS-based scams, often referred to as "smishing" (SMS phishing). These scams…read morearrow_forward
Social Media
Protecting Your Privacy: How to Master Social Media Settings
Apr 10, 2024 In a world where social media plays a pivotal role in our daily lives, safeguarding our personal information has never been more critical. With…read morearrow_forward
People Patching
Defending the Human Firewall: Understanding People Patching and How to Avoid It
Mar 17, 2024 In the ever-evolving landscape of cybersecurity, a new term has gained traction: people patching. This concept, while not as widely…read morearrow_forward
Doxxing
Combating Doxxing for Professionals, Parents, and Gamers
Mar 07, 2024 In the interconnected realms of professional, parental, and gaming spheres, the digital threat of doxxing looms large, presenting a multifaceted…read morearrow_forward
Online Gaming 4
Protecting Your Children from the Risks of Online Gaming
Feb 27, 2024 In the immersive world of online gaming, where virtual achievements and digital realms offer a respite from reality, lurking dangers pose…read morearrow_forward
Data Breach Time Delays
Why Detecting Data Breaches Takes Time
Feb 06, 2024 In today's digital age, data breaches have become all too common, with news of major companies falling victim to cyberattacks frequently hitting…read morearrow_forward
Credential Stuffing
Stay Secure Online: Your Guide to Outsmarting Credential Stuffing Attacks
Jan 23, 2024 Credential stuffing is a sophisticated cyber attack method where attackers deploy automated tools to test stolen username and password…read morearrow_forward
Pig Butchering
Sidestepping 'Pig Butchering' Traps in the Season of Love
Jan 09, 2024 In recent times, a new scam has emerged from the underbelly of cybercrime, known as 'Pig Butchering'. No, it doesn't involve actual pigs…read morearrow_forward
Dark Web
Discovered Your Email on the Dark Web? Here's Your Next Steps!
Dec 28, 2023 If you suspect that your email address has been reported on the Dark Web or…read morearrow_forward
Christmas Cyber Security
Your Guide to a Cyber-Secure Christmas
Dec 01, 2023 As the holiday season approaches, businesses must be prepared not only for the festive cheer but also for heightened cybersecurity risks.…read morearrow_forward
QR Codes
How to Outsmart QR Code Phishing
Nov 23, 2023 The term 'quishing' might sound cute…read morearrow_forward
how to avoid the 12 scams of Christmas
Avoiding the 12 Scams of Christmas
Nov 15, 2023 Tis the season to be jolly, but unfortunately, it's also the season when cybercriminals are working overtime to steal your holiday cheer.…read morearrow_forward
PASSWORD HYGIENE
Mastering Password Hygiene: Your Key to Online Security
Nov 02, 2023 A stolen trove of passwords released on the Dark Web has been analysed, and it reveals a dangerous trend in how Aussies choose their…read morearrow_forward
Passwords rip 1
How to Know If a Website Is Safe For You To Use Your Credit Card
Oct 13, 2023 Imagine this... you're browsing a website that promises great deals, but something feels off. You're not sure if it's a legitimate site or a…read morearrow_forward
Passwords rip
Is This The End Of Passwords?
Oct 08, 2023 You may have seen the term 'passkey' popping up more and more... But what are they and why should you care…read morearrow_forward
Which 2 FA Suits You Best
Defending Your Data: Which Two-Factor Authentication Method Suits You Best?
Aug 18, 2023 Two-factor authentication, commonly referred to as 2FA, is a vital layer of cyber security designed to ensure that you're the only person who can…read morearrow_forward
Cyber Heroes is Demystifying Australia's Notifiable Data Breach Laws for you
Demystifying Australia's Notifiable Data Breach Laws
Aug 09, 2023 In Australia, the Notifiable Data Breaches (NDB) scheme is governed by the read morearrow_forward
Cyber Heroes Will Show You How To Manage Your Supply Chain To Keep Your Data Safe.
Strengthening Supplier Chain Management - how to ensure your suppliers keep your data safe
Jul 26, 2023 In the digital age, businesses are increasingly reliant on supplier chains to deliver goods and services efficiently. However, this…read morearrow_forward
Find Out How You Can Defend Your People, Profits and Reputation From ChatGPTs Evil Twin, Worm GPT.
Is ChatGPTs Evil Twin (WormGPT) Inside Your Inbox?
Jul 21, 2023 There's no doubt, in the grand tapestry of technological progress, artificial intelligence (AI) represents a revolution. As a force for…read morearrow_forward
PCI Compliance:  Cyber Heroes shows you how to safeguard your business and customers' data
PCI Compliance: How To Safeguard Your Business and Customers' Data
Jul 19, 2023 In today's digital landscape, where online transactions have become the norm, ensuring the security of sensitive payment card information is of…read morearrow_forward
The Top 7 things you need to know about General Data Protection Regulations and Cyber Security
Unraveling the GDPR: Protecting Privacy in a Data-Driven World
Jul 12, 2023 In a world increasingly fuelled by data, privacy rights have taken centre stage. A pivotal player in this privacy revolution is the read morearrow_forward
From a cybersecurity perspective, find out how deepfakes can impact individuals, organisations, and society in several ways.
What is Deepfake (and are the risks real)?
Jul 07, 2023 Deepfakes, which refer to manipulated or synthesised media content using artificial intelligence techniques, pose significant challenges to…read morearrow_forward
Cyber Heroes shows you how to implement Data Loss Prevention measures.
What is Data Loss Prevention (and why should you care)?
Jun 30, 2023 In the ever-growing technological world, data has become the new gold. However, along with the enormous benefits of data comes the severe…read morearrow_forward
How SOS Mode on Your Mobile Could Indicate a Cyber Attack.
How SOS Mode on Your Mobile Could Indicate a Cyber Attack
Jun 21, 2023 SOS mode is a feature on many smartphones that allows users to quickly contact emergency services or designated contacts in times of need.…read morearrow_forward
Seven Key Signs To Help You Identify A Fake Website And What To Do If You Suspect Something Is Not Right
Top 7 Ways to Spot a Fake Website
Jun 15, 2023 The Internet is an extraordinary tool that connects us to a world of knowledge, entertainment, and opportunities. However, it's also home to…read morearrow_forward
The Top 5 Cybersecurity Risks Associated With Neglecting User Access Registers
The Top 5 Cyber Security Risks of Not Maintaining A User Access Register
Jun 06, 2023 As we continue to tread further into the digital age, the significance of cybersecurity training has skyrocketed. Whether for individuals or…read morearrow_forward
Five Ways That Using A VPN In Your Personal Life Is A Powerful Tool That Provides Online Security, Privacy, And Freedom.
5 Reasons Why Using a VPN is Essential for Personal Online Security and Privacy
Apr 21, 2023 In today's digital age, cybersecurity has become a growing concern for individuals and businesses alike. With the increasing number of…read morearrow_forward
How To Protect Yourself From The Hi Mum Scam That Cyber Criminals Are Using To Try To Rob You.
Protecting Yourself from the 'Hi Mum' Scam: Top Tips to Avoid Falling Victim to this Ploy
Apr 18, 2023 The "Hi Mum" scam is a highly profitable scheme for cybercriminals that has been causing significant financial losses to Australians.…read morearrow_forward
Let's Discuss The Social Engineering Tactics That Cyber Criminals Use To Trick You Into Revealing Sensitive Information.
How To Spot (And Avoid) Social Engineering Tactics
Mar 27, 2023 What is social engineering? Social…read morearrow_forward
How To Set Up A Personal Cyber Security Schedule To Significantly Reduce The Risk To Your Family Of Becoming Victims Of Cybercrime.
How To Set Up Your Simple Personal Cyber Security Schedule
Mar 24, 2023 Managing your personal IT security is essential, and establishing a monthly routine for this purpose can be highly beneficial. Think about all of…read morearrow_forward
Cyber Heroes helps you to be cybersafe when using your Smart phones.
Protect Your Digital Life: Top 5 Tips for Securing Your Smartphone Against Cyber Attacks
Mar 17, 2023 Smartphones have become an integral part of our daily lives, and we rely on them for everything from communication to banking and shopping.…read morearrow_forward
Understanding How DMARC, SPF And DKIM Can Protect You And Your Business Against Phishing Attacks.
Protecting Your Email Communication in 2023: Understanding SPF, DKIM, and DMARC
Mar 15, 2023 The COVID-19 pandemic dramatically increased the reliance on email communication, as more people are working from home and relying on email to…read morearrow_forward
What Must You Do If You Receive A Suspicious Email To Protect Your People From Cyber Crime.
Don't Get Scammed: How to Spot and Handle Suspicious Emails
Mar 03, 2023 A suspicious email can look like it's coming from a legitimate source, but there are a few warning signs to watch out for. Suspicious…read morearrow_forward
An Explanation of Important Email Security Protocols In 2023.
Important Email Security Protocols in 2023
Mar 01, 2023 In today's digital age, email has become an essential mode of communication for businesses and individuals alike. However, the rise of email scams…read morearrow_forward
Cyber Security Audits:  The first step in making informed decisions to protect your people from cybercrime.
Cyber Security Audit: The First Step In Making Informed Decisions
Feb 24, 2023 As technology continues to shape our lives and business operations, the need for a robust cybersecurity strategy has become increasingly crucial.…read morearrow_forward