Aus Security Blog — Security

Is Your iPhone Protecting Your Privacy? The Truth Behind Apple's Claims

Posted by Security Team on

Is Your iPhone Protecting Your Privacy? The Truth Behind Apple's Claims
Apple has long positioned itself as a champion of user privacy, with high-profile ad campaigns proclaiming that "what happens on your iPhone, stays on your iPhone." However, recent revelations and court filings have called into question the validity of these claims, leaving many iPhone users wondering just how private their devices are.

Read more →

Email Forwarding Services: Protecting Your Privacy with Aliases

Posted by Security Team on

Email Forwarding Services: Protecting Your Privacy with Aliases
 Email forwarding services like addy.io and SimpleLogin have emerged as popular tools to help individuals safeguard their primary email addresses from spam, phishing attempts, and data breaches. In this post, we'll take a closer look at email aliases, their benefits, and how ProtonMail, a secure email provider, offers this feature to its users.

Read more →

QR Codes: Convenient Yet Dangerous?

Posted by Security Team on

QR Codes: Convenient Yet Dangerous?
Learn about the rising threat of QR code phishing attacks - what they are, how they work, latest attack statistics, and tips to protect yourself by spotting malicious QR codes leading to phishing sites.

Read more →

Faraday Bags: The Science of Shielding

Posted by Security Team on

Faraday Bags: The Science of Shielding
Discover the science behind Faraday bags, modern tools designed for digital protection. Explore their construction, functionality, testing processes, and diverse applications across industries. Learn how Faraday bags, based on 19th-century principles, are safeguarding our digital world today.

Read more →

Gone Phishing: A Guide for Australians

Posted by Security Team on

Gone Phishing: A Guide for Australians

Aussies, take note! We are facing an onslaught of phishing scams. And no phishing has nothing to do with a lazy Sunday afternoon by the lake. These are insidious attempts where scammers, masquerading as legitimate institutions or individuals, aim to capture your personal information through deceptive tactics. But it's more than just a tricky email or message, Let's explore the why, the how, and the ways to shield yourself from these cyber threats. The Escalation of Scams in Australia Recent statistics are a loud wake-up call for all of us. Scams have escalated by nearly 50% in the first half...

Read more →