The Mirai Botnet

A DDoS[1] attack on US internet service provider Dyn took place on the 21st of October, 2016. The attack took the form of a botnet of internet connected devices (primarily Digital Video Recorders and Webcams) […]
Your Cyber resource
A DDoS[1] attack on US internet service provider Dyn took place on the 21st of October, 2016. The attack took the form of a botnet of internet connected devices (primarily Digital Video Recorders and Webcams) […]
The non-profit Open Web Application Security Project (OWASP – https://www.owasp.org/) provides a list of 10 Risks to Web Application Security to guide architects, developers and security practitioners on critical vulnerabilities commonly present in web applications […]
Australia’s Cyber Security Centre (ACSC – https://www.acsc.gov.au/) provides a list of eight mitigation strategies (the Essential Eight) with practical guidelines for organisations to follow in order to mitigate cyber-attacks via prevalent attack vectors and to […]
The worldwide transition of IT systems deployed in closed networks and in-house enterprise IT networks to the public facing Internet is accelerating at a disturbing pace, raising justified concerns about security. Increasing reliance on intelligent, […]
The Confidentiality, Integrity and Availability (CIA) concept: The CIA Triad is a respected, recognized model for information security policy development which is utilised to identify problem spheres and significant solutions for information security. This paper […]