About Over 50 Rewards Circle Articles

Archived Articles

Health: What is the Fuss about Antioxidants?

Antioxidants are chemicals (both naturally occurring and man-made) that can prevent or slow cell damage. An "antioxidant" is actually not a substance; it is a behavior. Any compound that can donate electrons and counteract free radicals has antioxidant properties.

Contributed by Deb Nye-Chart: Registered Naturpath - Healing Naturally WA

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Health: Meat and cancer: Here is some perspective for doctors

Several leading Australian cancer authorities have jumped in to put perspective on the barbecue-stopping WHO report on the carcinogenic nature of red and processed meat. The report, ... should not be a concern to Australians if they stick to the current National Health and Medical Research dietary guidelines, says the Cancer Council.

Contributed by Amanda Davey: Medical Observer - medical news, opinion and analysis

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Health: Physios cry foul over 'GP-centric' chronic disease reforms

Physiotherapists have criticised the federal government's proposed chronic disease reforms for being 'GP-centric' and failing to respect patient choice. Patients eligible for care plans will have to register with practices, and payments for Health Care Homes will be bundled together into regular quarterly payments as opposed to a fee-for-service model.

Contributed by Rachel Worsley: Medical Observer - medical news, opinion and analysis

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Health: GPs reminded of obligations if stroke survivors want to drive

Contributed by :

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Health: Specialists urge 'radical' change to asthma treatment

Contributed by :

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Travel: The Sunlander to Cairns; a narrative

The crew are working in the galley getting my first meal of the day ready, the same team that were there last night so they have had a long ride as well. It is still lighter in the western sky than in the east as the cloudless sky there reveals the last reflections from the moon, while in the east there appears to be rain-clouds hiding any effort the sun may be making to influence the new day. The famous Mackay sugar-cane farms come into view and as we seem to be approaching a range there is quite a mountain just to the east of the track and now we are pushing our way through a cutting in the hills.

Contributed by Railway Portrait world rail history, stories and services

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Hobbies: Only Chauffeuring - Learn about becoming a chauffeur

Eddie Crespo is a man of passion - He has been in the Limousine Industry since 1990 after coming out of the Wedding Planning scene.

Contributed by Eddie Crespo: Only Chauffeuring Australia

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Health: The Life-Force in Your Gut

Your gut is where you absorb all the nutrients to power your body, making a healthy digestive system central to your overall health. But did you know that there are close to 2 kg worth of bacteria in your gut?

Contributed by Deb Nye-Chart: Registered Naturpath - Healing Naturally WA

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Health: Super Superbugs

The resistance of antibiotic has the potential to affect everyone on this plant. These days it goes without saying the many of us have would have heard about antibiotic resistance and scientific studies are showing so many of us are aware the cause of the current crisis, and it is a CRISIS! is simply due to the overuse of these antibiotics. However not many of us know how and where the resistance occurs.

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Health: Help In Giving Up Smoking

When smokers first start; they buy into years of conditioning telling them that smoking made them feel somehow better, more confident and more relaxed.

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Fifty PLUS!: Still like to Work? Applying with a Resume and Cover Letter

The internet is a wonderful tool that has millions of businesses advertising in your selected field. All you need do is look them up and send in the resume with a cover letter via their contact page. You never know, they might just be looking for someone with your talents.

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Fifty PLUS!: CoinSpace S Coin - becoming a Super Senior Entrepreneur

With the world's population getting older by the day, it should not be surprising to learn that a very large portion of new businesses are started by entrepreneurs aged 50 years and over.

Contributed by Coin Space S Coin Sydney: CoinSpacs S Coin Australia

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Fifty PLUS!: Women Hitting 50 - A Few Great Things About Women Hitting 50

Just about all of us 50 plus are fit, fun, sexy and more than capable. In the past half century most of us would have learned something to pass onto others. They talk about younger people, hmmm, I am sure we can all do the exciting things they get up to. As we have learned to do them better, smarter and we take our time, so we are always aware and able to take in all that is happening around us.

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Fifty PLUS!: Top 6 Booming Industries - For Startups in 2017

Uncertainty plagues the world today, but there's never been a better time for innovation for individuals and startups to make their mark and start a business. As a matter of fact, thousands of startup businesses are founded each year and 2017 won't be any different. But the trick is in ensuring your business survives and thrives for many years to come.

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Travel: Everything Elvis 40th Anniversary Tour

Everything Elvis 40th Anniversary Country Music in Nashville

Why settle for less when you can have it all. Once again itravel Woonona will take you to the South. We just don’t visit, we experience it, live it and love it.

Contributed by I Travel Personal Travel Managed services

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Travel: Getting the Right Travel Insurance for You

One of the greatest mistakes travellers make is waiting to get travel insurance until just before they leave. By putting off buying travel insurance you risk not having cover for the deposits you have already made for your trip should you unexpectedly have to cancel your plans.

Medical Costs can be expensive in a foreign country, so it is important to consider how much medical cover you have. Some insurers provide an unlimited amount of cover for medical expenses. Others may cap the amount.

Contributed by Fast Cover Travel Insurance

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Travel: Day Trips with Steam Railway

Puffing Billy: Dandenong Ranges Victoria

Puffing Billy is Australia's Premiere Preserved Steam Railway This century-old steam train is still running on its original mountain track from Belgrave to Gembrook in the scenic Dandenong Ranges and is a genuine relic of more leisurely days.

Contributed by Railway Portrait world rail history, stories and services

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Fifty PLUS!: Working After Turning Fifty

In today's aging population, it should not come as a surprise that almost 35% of new businesses are started by entrepreneurs aged 50 and over. Along with years of experience, the retiree lifestyle lends itself to the time and knowledge needed for a new business. According to recent research, this age group are the fastest growing segment of entrepreneurship, leading to the development of the term 'seniorpreneur'.

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Hobbies: CoinSpace S Coin - Learn about becoming a Super Senior Entrepreneur!

With the world’s population getting older by the day, it should not be surprising to learn that a very large portion of new businesses are started by entrepreneurs aged 50 years and over.

Contributed by Coin Space S Coin Sydney: CoinSpacs S Coin Australia

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 01

Kiddie script - Weaponised container

In programming and hacking culture, a script kiddie or skiddie (also known as skid or script bunny) is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks and deface websites. (source: wiki)

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 02

AP (access point)

AP is a device that allows wireless devices to connect to a wired network using Wi-Fi or related standards.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 03

Kali Linux and Ransomware

In February 2016, the Hollywood Presbyterian Medical Centre paid $17,000 US in ransomware.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 04

John the Ripper

John the Ripper is a fast password cracker, currently available for many flavours of Unix, Windows, etc. Its primary purpose is to detect weak Unix passwords. It is a free and open source software distributed in code format. There is a version called John the Ripper Pro, which is distributed in the form of a native package for the target operating systems.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 05

Single Point of Failure and Hackers

This is a fictional narrative by Tom Scott; however you can learn about what can happen if 'disaster strikes' in the wrong hands of someone with a 'anarchist' agenda.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 06

Dangers with Free Wi-Fi

If you do want to make use of public or hotel Wi-Fi here are a few suggestions to will help to reduce your risk.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 07

The Dark Side of the Web

50% of respondents have experienced at least one cyber incident in the past year. What is of concern is that 8% of respondents were unsure if they had experienced a cyber incident.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 08

The Delimma of Privacy

We all want to have our privacy respected and at the same time, we want to be safe; if we hear about a crime, we are glad when the authorities catch the perpetrators.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 09

Security Locky Ransomware - Defence

Locky is the pet name of a virus that can be emailed to unsuspecting people. They open the document or file sent as an attachment and Locky strikes. What happens next:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 10

Pokemon Go

Pokemon Go When people signed up to Pokemon Go through their Google account, Niantic (owner of Pokemon Go) requested full access. An app with full access can modify most of your information in you Google account (it can see content of gmail, google docs, google drive and google calendar).

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 11

Exploit Kit -SecurityIdentifying vulnerabilities in the client machines

Exploit kit = software kit designed to run on web servers with the purpose of identifying vulnerabilities in the client machines that communicate with the server; once the vulnerabilities are discovered, it uploads and executes malicious code on the client.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Cyber Computer Security 12

Trump free WiFi anyone?

Privacy Shield = EU-US Privacy Shield is a set of principles between US and the European Union, allowing some US companies to receive personal info from EU entities, under EU Privacy Laws. Replaces International Safe Harbor Privacy Principles (established in 2000) - NOT in effect as yet. Outstanding issues: deletion of data, collection of large amounts of data and Ombudsman mechanism.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Services: Computer Security No 13:

Security Deep or Dark?

There's a difference between the "Deep Web" and "Dark Web." While the "Clear Web" is the surface area which is indexed by search engines such as Google and Yahoo, the Deep Web is an area search engines can't crawl for or index.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 14:

The Impotance of Passwords

Why 'Smart' objects may be a dumb idea & "my toothbrush hacked my toaster"

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 15:

Security Census Debacle

I watched in astonishment how the head of ABS explained the system had been load-tested for 1 million questionnaire sessions per hour, which was clearly inadequate.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 16:

Has your account been hacked?

A year after the Ashley Madison hack, where 36 million account details (670,000 Australians amongst them) were published online, the full report was released.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 17:

Apple Devices Malware - Upgrade urgently!

After I sent the newsletter last week, I was alerted to what is one of the largest Apple exploits. The exploit can affect every possible Apple device on the planet - iPhone, iPads, etc. With a click, the virus can steal the information from your phone, intercept calls, messages, steal emails, contacts, etc.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 18:

Zero day exploit

Zero day exploit = is an undisclosed software vulnerability that hackers can exploit to adversely affect computer programs, data or other computers on the network. This refers to a vulnerability (bug) that was not reported, is not known by the software vendor; it leaves the software vendor with "0 days" in which to create a patch or advise workarounds.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 19:

USB stick can kill any device it touches

A friend of mine sent this article about the chilling device that can destroy the computers it is plugged in. Its success rate - 95%! It costs $74.50 and was designed to test surge protection of electronics; it is marketed to penetration testers. Here's how it works:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 20:

Australians Fall Victims of the Binary Options Scam

Australians lost $3m this year alone to scammers that lure you with the opportunity to make money through asset price movement. Binary options involve predicting the movements of commodity, asset or index prices over a short time. Here’s how it works:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 21:

Australians Fall Victims of the Binary Options Scam

Australians lost $3m this year alone to scammers that lure you with the opportunity to make money through asset price movement. Binary options involve predicting the movements of commodity, asset or index prices over a short time. Here’s how it works:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 22:

Banks - Many large merchants now accept Bitcoin payments

A blockchain is a public ledger of all Bitcoin transactions that have ever been executed. It is constantly growing as 'completed' blocks are added to it with a new set of recordings. The blocks are added to the blockchain in a linear, chronological order.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 23:

Blackmores Running Festival Participants Email Hack

Blackmores engaged Pont3 to collect email addresses and lots of personal details necessary for them to spam you afterwards with Vitamin emails. The only problem is that the email database was hacked and so far over 33,000 participants have received a variety of spam and phishing emails.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 24:

Brad Pitt Death Hoax

I never thought I would be talking about Brad Pitt - Yet since the 21st of September, there has been a flood of messages, Facebook news reports or emails that have "Brad Pitt Death"

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 25:

Rehearsal to take down America?

As soon as I hit the send button last Friday for the Security Newsletter, we got the news about the terrifying attack on Dyn, which provides network traffic management services to Facebook, Paypal, Netflix, Twitter, Spotify, AWS, AirBnB, Reddit, GitHub and many other large companies.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 26:

iPhones Can Be Hacked

WARNING!!: iPhone users who failed to update their devices to Apple's latest iOS 10.1 release for iPhone and iPad may get their device hacked!

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 27:

Donald Trump Cyber Security

Trump's ideas about Cybersecurity were not very coherent in June when he was interviewed on the subject, but we know he will give a high priority to defending America.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 28: Private Security

Private Security

Christmas is coming and fraudulent app developers are flooding the Apple and Android app stores with apps that pose as legitimate retailers for luxury brands like Moncler, Celine, Salvatore Ferragamo and more.

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 29:

Corporate Security

The hackers exlpyted he employees default PIN codes to log into W-2Express, an Equifax service. The PIN codes used a common system: employees social security number and date of birth. The hackers stole tax and salary data for a large number of the W-2Express service.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 30:

Bitcoin Black Friday Private Security

Bitcoins are a cryptocurrency and payment system introduced in October 2008. The bitcoin transactions are recorded in a public distributed ledger called the blockchain. By 2015, more than 100,000 merchants were accepting Bitcoin payments.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 31:

Saudi Arabia under cyber attack by Iran Malware sources

The attack started on November 17 and targetted 6 major Saudi Arabian sites, including the central bank, the aviation ministry, the transportation ministry. The digital evidence points to Iran as the origin of the multiple attacks.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 32:

Facebook & your social whereabouts Security

Last Friday I attended a national Cyber forum for healthcare. One of the presenter, a top Cyber security expert alerted us to a recent ransomware case he had heard of: an executive received a ransomware note (in the thousands of dollars) linked to the threat to destroy the executive's son profile and reputation on Facebook...

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 33:

FBI gets power to hack millions of computers globally

The US Supreme Court approved amendments to Rule 41 which gives judges the authority to issue search warrants for computers located in their jurisdiction and also outside of their jurisdiction..

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 34:

Yahoo disabled email auto-forwarding making it harder for users

After suffering a massive 2013 attack, Yahoo finally reports a breach of more than 1 Billion user accounts. They suffered a separate attack in late 2014, which compromised 500 Million user accounts.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 35:

EU court slams indiscriminate data collection opening challenge to British cyber law

(The law requires telecommunication companies to store the web and message history of Britons for the government to access)

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 36:

Cyber-savvy New Year's Resolutions

New Year Resolutions are not hard to keep provided you constantly work on them and review the progress at set periods of time. Everything is really possible, if you are dedicated and flexible to shape the pathway but not the goals.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 37:

Beware of the new phishing campaign targetting Gmail users

New Year Resolutions are not hard to keep provided you constantly work on them and review the progress at set periods of time. Everything is really possible, if you are dedicated and flexible to shape the pathway but not the goals.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 38:

Called Spora after the russian word for spore, this ransomware offers five levels of decryption to those infected.

The first two files you restore are free, then you start paying. How do people get infected? Via email with attachments; the attachment comes in the form of a ZIP file, which when opened contains an HTA file which in its turn contains a VBScript, etc.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 39:

Hotel ransomed by hackers as guests are locked out of rooms in Australia

Romantik Seehotel Jaegerwirt, a luxurious 4-star hotel in Austria paid thousands in Bitcoin ransom to cybercriminals who hacked their electronic key system.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 40:

76 Popular apps confirmed vulnerable to silent interception of TLS-protected data

An analysis of iOS apps by Will Strafach, a respected mobile security expert in US, revealed 76 popular iOS applications are vulnerable and allow malicious proxies to insert invalid TLS certificates.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 41:

Hackers offering money to company insiders in return for confidential data

What are your obligations as a director/officer of the company or manager in this new cyber environment?.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 42:

MasterCard to launch biometrics payment app in Australia

MasterCard has announced the launch of its MasterCard Identify Check app in Australia. This will enable people to use facial recognition.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 43:

Cloudbleed - One of the worst data leaks in the last few years

Cloudbleed is the security bug discovered on 17 February 2017, affecting Cloudflare's reverse proxies.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 44:

How Yahoo's latest "forged cookie" hack can affect you

Yahoo suffered the third hacking incident since 2013 when it realised cyber attackers created "forged cookies" that can access user accounts without their login information. Yahoo told the Guardian that the forged cookies have been "invalidated" and cannot be used again, but the potentially malicious activity could still have implications for already-affected users.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 45:

Password Managers Discussion

Why should you consider a Password Manager:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 46:

Hackers threaten to wipe iPhones unless Apple pays ransom

According to Motherboard (news site https://motherboard.vice.com), a hacker or group of hackers ('Turkish Crime Family') is allegedly trying to extort Apple over access to 300 million iCloud and Apple email accounts.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 47:

CIA - Wikileaks Vault7

Wikileaks has recently released its second article and batch of documents called "Dark Matter". This covers the documentation for several CIA projects:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 48:

Apple and Google phones urgent updates

A researcher from the Google's Project Zero, Gal Beniamini, discovered major vulnerabilities in the Broadcom's WiFi chips of the following phones:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 49:

CIA - Wikileaks Vault7

Wikileaks has recently released its second article and batch of documents called "Dark Matter". This covers the documentation for several CIA projects:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 50:

Prisoners in Ohio built networked computers used in crimes

Two prisoners in the Marion correctional institution in Ohio built two networked computers from various parts they were supposed to disassemble as part of a rehabilitation program.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 51:

Intercontinental hotel chain - stolen paycards data

"Front desk cash registers at more than 1,200 hotels in the InterContinental Hotels Group, which includes the Holiday Inn and Crowne Plaza brands, were infected with malware that stole customer debit and credit card data between September 29, 2016 and December 29, 2016, the company said.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 52:

Prizes offered to celebrate our 1 year anniversary

We would like to thank our readers and wish to offer 5 winners free entry to our courses, listed below:.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 53:

Wikileaks Scribbles & Whistleblower protection

Wikileaks released the manuals and code for yet another CIA tool for spying on whistleblowers. Scribbles allegedly embeds a web beacon-style tag into watermarks located on Microsoft Word documents that can report document analytics back to the CIA.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 54:

WannaCry the malware that took over the world

Last Friday (12/05/17), the WCry or WannaCry ransomware campaign started scanning the Internet for computers that were not patched to the latest version from Microsoft.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 55:

Privacy Changes ahead in 2018

Marianne Dunham, ABG Executive Advisor for Victoria and Tasmania, a seasoned barrister with tech knowledge and qualifications, a member of the Victorian Law Institute IP/IT Committee, brought to our attention the changes ahead affecting organisations from 2018.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 56:

Nigerian scammers sentenced to a total of 235 years

"Three Nigerian nationals, who were extradited from South Africa to the Southern District of Mississippi in July 2015, were sentenced to prison this week for their roles in a large-scale international fraud network."

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 57:

Insurance does not pay for human errors

KnowBe4 put out an interesting post on the aspect of human error when asking for a policy pay-out.

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Computer Security No 58:

Eleven steps to improve your privacy

Heimdalsecurity recommends a few steps to achieve this:

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

The World N0 1:

The world adjusts to the idea of Donald Trump

As the world adjusts to the idea of Donald Trump as President-elect of the United States, AJP examines his comments regarding healthcare and drugs

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Health: Stroke

GPs reminded of obligations if stroke survivors want to drive

About a quarter of acute stroke survivors younger than 65 go back to driving too soon.

JOIN NOW OR LOGIN TO READ MORE OF THIS ARTICLE

Read More About Over 50's News Articles

Disclaimer: Most of the photos used on AML websites are from our own photographers and paid purchases. Some are obtained from to the best of our ability known to be FREE materials websites. For any complaints about this site or its contents please contact: enquiries@australiamyland.com.au

Thank you for visiting About Over 50 - enjoy browsing.
SUBSCRIBE AND SHARE
AML-AM Guide to Australia AML on You Tube
 

Contact Us WITH ONLINE FORM NOW for more information
or simply email to
INFO@ABOUTOVER50.COM.AU

The About Over 50 Guide is an Australia My Land Business Initiative
Australia My Land Online Magazine
register with Australia My Land Associates Marketplace AML-AM
 
 

© Australia My Land Pty Ltd 2007 - 2017             website by aml websites online