
The Gridware Blog
20 FOLLOWERS
Founded in Sydney, Australia, Gridware has grown to become a leader in cybersecurity and incident response services both locally and internationally. The Gridware helps out-innovate hackers by driving and delivering real innovation in the cyber security industry. Our mission is to help people, governments and businesses around the world defend themselves against cybercrime and reduce their..
The Gridware Blog
6d ago
The Australian Government has recently launched a new Cyber Security Strategy for 2023-2030, a plan that addresses the evolving digital threats. This is especially relevant for small and medium businesses (SMBs), which are often more vulnerable to cyber-attacks.
Financial Commitment and SMB-Focused Initiatives
A total of $586.9 million is distributed to various sectors under the strategy, showing a substantial investment in cyber security. Key initiatives for SMBs include:
1. Cyber Health-Check Program
Budgeted at $7.2 million, this program provides free cyber security asse ..read more
The Gridware Blog
2M ago
Pizza Hut Data Breach
Pizza Hut Australia has publicly disclosed a cybersecurity incident affecting approximately 193,000 customers. The compromised data ranges from personal details to encrypted credit card numbers.
How Did the Attackers Get In?
While the exact method used by the attackers to breach Pizza Hut’s systems hasn’t been disclosed, there are common attack vectors that often come into play in similar cases:
Zero Day Attacks: Exploiting unknown software vulnerabilities before they can be patched.
Credential Theft: Unauthorised access using stolen login credentials.
Business Email Co ..read more
The Gridware Blog
2M ago
Update to iOS 16.6.1
If you’re an Apple user with an interest in cryptocurrencies, consider updating your device’s software immediately. Recent security vulnerabilities have made iOS and iPadOS susceptible to attacks—making your digital assets more vulnerable than ever.
Discovery of the Zero-Click Vulnerabilities
Cybersecurity experts at Citizen Lab were the first to spot these vulnerabilities, identifying them as zero-click attacks that can compromise digital assets. In response, Apple has rolled out timely security updates to counteract these threats.
Guarding Agains ..read more
The Gridware Blog
3M ago
How to Guard Against the MMRat Trojan on Your Android Phone
If you’re an Android user, be cautious. The new MMRat Trojan targets your bank accounts with the intent of committing bank fraud. Fortunately, there are measures you can take to protect yourself.
What Does MMRat Do, Anyway?
Here’s a breakdown of how MMRat works:
Users see an enticing ad for a new game or tool while browsing online.
Users are Redirected to a web page mimicking a legitimate app store.
Users download what they think is a legitimate app, but it contains the MMRat Trojan.
installation, MMRat asks for device permissions l ..read more
The Gridware Blog
3M ago
If you’ve ever been a Mac user, you’ve probably heard the common phrase: “Macs don’t get viruses.” While this statement was once a selling point for Apple’s personal computers, it’s no longer strictly true. With the digital landscape evolving rapidly, macOS faces its fair share of threats, just like any other operating system.
The recently published Bitdefender’s 2023 macOS Threat Landscape Report discusses the threats and potentially unwanted applications (PUAs) affecting macOS in 2023. So, how safe is your macOS really? Let’s dive in.
The Rise of Mac-Specific Malware
Acco ..read more
The Gridware Blog
3M ago
A Closer Look at Queensland’s Charity Data Breach
More than 70 Australian charities utilised the services of Brisbane-based Pareto Phone, a telemarketer. Among them, The Cancer Council, Canteen, and Fred Hollows Foundation were affected by a data breach, leading to personal information being leaked to the dark web.
How Was the Breach Possible?
Pareto Phone was targeted by cybercriminals in April, leading to the leak. The telemarketing company collected donations from supporters, retaining documents as old as nine years, potentially breaching the privacy act. One charity alleged Pareto Phone r ..read more
The Gridware Blog
3M ago
The Alleged Breach: What’s Happening?
auDA, Australia’s internet domain administrator, is investigating an alleged data breach involving 15GB of data. This could affect anyone with an AU domain, given auDA’s authority over domain space.
auDA discovered a potential breach last Friday. The following day, they released more information and notified the Australian Cyber Security Centre, the Department of Home Affairs, and the Office of the Australian Information Commissioner about the situation.
Understanding auDA
auDA controls all Australian websites ending with .au, and as of the given date, th ..read more
The Gridware Blog
3M ago
DoorDash, the well-known food delivery service, recently faced a hefty fine of $2.01 million from the Australian Communications and Media Authority (ACMA). They were penalised for breaking Australian spam rules by sending over 566,000 emails to customers who had already unsubscribed and 515,000 texts to prospective drivers without an unsubscribe option.
Why It Matters
This incident didn’t just hit DoorDash’s bank account; it revealed a big misunderstanding. They thought their texts to prospective drivers were purely factual. In reality, they were offering business opportunities, making them ..read more
The Gridware Blog
3M ago
In a world increasingly leaning on the digital realm, Google’s Incognito Mode was many users’ go-to for discreet web activities. Now, a momentous US$5 billion class action lawsuit is causing ripples, challenging our understanding of online privacy.
What’s Incognito Mode, Really?
Google presents its Incognito Mode as a haven for privacy. Open a window, and when you close it, your digital traces—like browsing history and site visits—disappear. But recent findings suggest it might not be as secure as we thought.
Google's Incognito promise: 'Chrome won’t save your data.' But i ..read more
The Gridware Blog
4M ago
What Your Keyboard Tells About You
The digital world is ever evolving. One of its latest discoveries is the New Acoustic Cyber-Attack. This method can figure out 95% of what you’re typing just by listening to your keystrokes.
The Discovery: How It Works
Researchers found an interesting gap in our security. Every time we press a key on our keyboard, it makes a sound. These sounds aren’t all the same. By recording these sounds with a regular smartphone, and then feeding this information into a computer program, they managed to match the sounds to the keys with a 95% success rate.
Sound wave pa ..read more