The prevalence, scale and complexity of scams targeting Hong Kong people have become an epidemic requiring concerted action on all…
In today’s digital-first business environment, cyber threats are not just an IT problem they’re a core business risk. Board members…
Sushi Sushi, an Australian chain with 170 locations, is expecting to make “good headway” with a digital transformation that has…
I have an idea for a potentially universal guideline for maturing as a civilization: Humans should use a combination of…
In the modern enterprise, cybersecurity is no longer just a technical concern it is a boardroom priority. The frequency and…
My thinking on Israel has changed a lot over the years. I’ve spent a few weeks there while in my…
Following a recent US-led court-authorised operation that removed malware from over 4,200 infected networks, new activity has emerged from the…
Cybersecurity experts have identified a sophisticated new phishing technique that exploits the SVG (Scalable Vector Graphics) file format to deliver…
I’ve been thinking recently about a concept I call “The Principle of Many Truths”. It’s a way of explaining why…
In a concerning evolution of cyber infiltration tactics, North Korean IT workers have begun deploying sophisticated real-time deepfake technology during…
Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed “VibeScamming,” where cybercriminals are using AI tools to…
Some people prefer using jj instead of jk, but I prefer jk for two reasons: jk is typed with two…











