Australia Free Web Directory

Black Hat Consortium | Science, technology & engineering



Click/Tap
to load big map

Black Hat Consortium

Phone: +61 433 633 921



Reviews

Add review



Tags

Click/Tap
to load big map

22.01.2022 Nice Thermaltake build themed on Iron Man. Uses Thermaltake M240 Waterkit and cpu / gpu distribution plate.



19.01.2022 Do you know a child who got an Internet-connected device over the holidays? Follow our tips to keep their (and your) privacy protected. 1. Change the default password on high-tech toys and gadgets that are Bluetooth or Wi-Fi enabled. Most of these items come with a default or generic password that is easy to hack. Change it to something more difficult to guess. 2. Disable photo geotagging on all their devices. Savvy predators can use it to pinpoint your child’s location... from photos, videos or social media content they post. 3. Remember to change the password on your Wi-Fi routers and to use built-in settings that establish the level of control your household needs for the kids, such as access times and website category blocking. 4. Before you hand over new devices to your kids, set up non-administrative accounts. This way, they can’t change settings or download or install apps without your consent. 5. Remind your kids not to share any personal information, such as their address, phone number or email address. Predators scan for that information and use it to track kids’ moves and try to connect with them. For more information, please see the below link for assistance to Parents.

11.01.2022 A new PC security vulnerability has been discovered by researchers in Europe. This vulnerability is specifically for users with an Intel Processor, AMD users are immune to this. Titled "Plundervolt", the security vulnerability will allow users to execute code on the targetted system by exploiting the system's ability to change the processor's voltage. This can lead to serious damage to a system physically, with the attacker able to alter the voltage of the CPU so that they op...erate outside of the manufacturer's specification. More importantly, the attacker will have access to code that is contained within the (Software Guard Extensions) SGX sector of the processor to be accessed by the attacker. If this area contains information such as encrypted keys, the attacker would be able to steal these and unlock any information associated. This interface can only be accessed if the attacker has root or administrative access to the affected device. Should you be concerned? This fault can be mitigated with a Microcode update to the motherboard of your PC or Server. This update should not be performed without technical assistance, as it can result in damage to the components within your computer. If you are concerned, please contact us for advice or speak to your local IT Technician.

10.01.2022 Latest Windows 10 Vulnerability: Eternal Blue Whats the situation? In a nutshell, the vulnerability would allow hackers set up a website with fake credentials and fool a Windows 10 PC into believing it is the real deal. This would then allow the attacker to exploit your Windows 10 PC, by executing remote code that it believes is a real and genuine instruction. What should you do? There is currently a Critical Security update on Windows 10, released on the 11/01/2020. By goin...g to Start > Settings (The little cog) > Update and Security, it will confirm for you whether the latest update has been downloaded. If you're up to date, you'll see the green tick. If not, click check for updates and download the latest update. Windows 10 PCs by default update on the latest security updates, as these cannot be delayed by the standard user, so you should already be safe - but its always better to be sure.



06.01.2022 Nice Thermaltake build themed on Iron Man. Uses Thermaltake M240 Waterkit and cpu / gpu distribution plate.

01.01.2022 Recently, a Facebook data breach was detected in December. This is unfortunately resulting in the loss of 267 Million user's account details, including usernames, email addresses, passwords and personal information. As a common step in all Cyber Security procedures, if you believe you may be affected, we ask that you change your password (or to be doubly-sure email as well) on your account. Secondly, you should enable Two-Factor Authentication. This can be found in the secur...ity section of Facebook settings. It is a very good habit to ensure that your account remains secure by regularly changing the password, making a more complex password and enabling two-factor authentication using your mobile phone. If you have any further concerns, the article below will assist in helping to activate two-factor authentication. https://www.facebook.com/help/148233965247823

Related searches