View Post

Spectre NG – Eight new vulnerabilities discovered in Intel CPUs

According to an exclusive report published by German magazine CT additional eight vulnerabilities have been discovered, one of them potentially more dangerous than the initial Spectre and Meltdown vulnerabilities.
All eight vulnerabilities have already received official CVE numbers, but due to security considerations no further information has been publicly disclosed yet. Currently they are simply referred to as spectre next-generation and affect again CPUs from Intel and most likely from ARM as well.

View Post

Office 365 Message Encryption – Email encryption for the masses

With Office 365 Message Encryption Microsoft released a feature that greatly simplifies the exchange of secure emails. Before if you wanted to securely communicate with a business partner he would have to share his public key for you in order to encrypt the message, which was a complicated and often cumbersome process. Office 365 now allows for sending encrypted emails to business partners without any prior setup or key exchange.

View Post

EU GDPR – What the EU General Data Protection Regulation means for your Australian Business

The proposed new EU data protection regime extends the scope of the EU data protection law to all foreign companies processing data of EU residents. It provides for a harmonisation of the data protection regulations throughout the EU, thereby making it easier for non-European companies to comply with these regulations; however, this comes at the cost of a strict data protection compliance regime with severe penalties of up to 4% of worldwide turnover.

View Post

Critical processor vulnerability and how to protect yourself from Spectre and Meltdown

Initially discovered by Google’s security team around June last year the vulnerabilities named Meltdown and Spectre would allow an attacker to obtain unprivileged access to contents held in memory of a device, which in turn would allow to gain access to sensitive data like passwords or security keys.
Nearly all processors released within the last 10 years are affected, including desktop PCs, notebooks, tablets and phones. We have compiled an overview of the major vendors and devices with recommendations to help you stay secure.

View Post

Severe WiFi security flaw leaves users vulnerable to attacks

Researchers have discovered a key flaw in the WPA2 WiFi encryption protocol that could allow attackers to intercept passwords and other sensitive information. Because the vulnerability is in the WiFi standard and not specific products this means that the attack works against all modern protected Wi-Fi networks.

View Post

The Benefits of Managed Cloud Services For Boosting SEO

Managed cloud services can be the difference between you and your competition. Why? Because even if you are invested in SEO tools and strategies for your WordPress site, without managed cloud services you are automatically at a disadvantage when it comes to SEO.

View Post

Queensland Small Business Digital Grants Program

The Small Business Digital Grants Program provides small businesses with access to digital technologies and services to enable them to work smarter, engage with the global economy and make the most of online business opportunities arising from digital disruption. Matching funding of up to $10,000 (excluding GST) may be provided to eligible businesses for the purchase of hardware, software and services (such as digital coaching).