FB pixel

News Articles

Subject: Cyber

Law Firms Face Extortion
Law Firms Face Extortion

Many Australian law firms and their clients could find themselves facing extortion by online hackers after reports of a major security breach of an Australian legal services firm.

Beware Who's Using Your Internet Service
Beware Who's Using Your Internet Service

Small businesses providing Wi-Fi to their patrons could face serious charges if people use their internet is used for nefarious means.

Is it Time to Hit the Delete Key on TIK TOK?
Is it Time to Hit the Delete Key on TIK TOK?

Brisbane cyber lawyer Sandy Zhang says media reports of fears that Tik Tok, owned by a Chinese company, is being used by the Chinese Communist Party to track users is heightening fears amid a stand off between Australia and China and a deteriorating relationship between the countries.

Woman holding phone with laptop in background
Scammers Thrive in a Coronavirus World

People working from home or surfing the Internet in a coronavirus home isolation need to be super aware of predatory cyber scammers who are very active right now.

Scam warning sign red and white
Staying safe on the Internet - Trust nobody

Cyber criminals are now so rampant on the Internet trying to rip off victims that it’s becoming safer to adopt a “trust nobody” attitude toward online transactions.

Cyber security man on computer hacking system
Glencore vs ATO AKA: Information Security/Legal Privilege

Glencore is taking the ATO to the High Court to stop it using stolen information.

Blue cyber security theme with key lock in the middle
Lawyers Weekly Podcast - Cyber Security for Lawyers

Listen in to EAGLEGATE's very first Podcast on Lawyers Weekly - Nicole talks all things cyber for lawyers and how lawyers can be proactive in cyber security in their own firms.

Cyber security showing 5 people shadow in blue background
United Nations Cyber Security Breach

The United Nations is the latest organisation to experience a privacy breach. Again, the privacy breach has occurred through a third party provider and a lack of proper configuration.