ARTICLES
These articles inform you about information security incidents, trends, and risks. Also included is our range of cyber security products
Cyber Security Guides
![Keyless Car Key Theft Prevention: Use a Car Key Faraday Bag - Securitybase](http://securitybase.com.au/cdn/shop/articles/keyless-car-key-theft-prevention-use-a-car-key-faraday-bag-683033.jpg?v=1719999747&width=533)
Keyless Car Key Theft Prevention: Use a Car Key...
In the age of convenience, keyless entry systems have become a standard feature in modern vehicles. While offering ease of access, these systems have unfortunately opened the door to a...
Keyless Car Key Theft Prevention: Use a Car Key...
In the age of convenience, keyless entry systems have become a standard feature in modern vehicles. While offering ease of access, these systems have unfortunately opened the door to a...
![How Cyber Hygiene Can Keep You Safe in 2023: 8 Tips - Securitybase](http://securitybase.com.au/cdn/shop/articles/how-cyber-hygiene-can-keep-you-safe-in-2023-8-tips-857249.jpg?v=1719143031&width=533)
How Cyber Hygiene Can Keep You Safe in 2023: 8 ...
What Is Cyber Hygiene? Cyberhygiene is the first line of defense against hackers and cyber-attacks. Good cyberhygiene consists of simple daily routines, good procedures, and periodic check-ups to make sure...
How Cyber Hygiene Can Keep You Safe in 2023: 8 ...
What Is Cyber Hygiene? Cyberhygiene is the first line of defense against hackers and cyber-attacks. Good cyberhygiene consists of simple daily routines, good procedures, and periodic check-ups to make sure...
![Microphone Hacking 101: How It Happens - Securitybase](http://securitybase.com.au/cdn/shop/articles/microphone-hacking-101-how-it-happens-458070.jpg?v=1719143049&width=533)
Microphone Hacking 101: How It Happens
What is microphone hacking? Microphone hacking is the use of malware by a hacker or third party to gain unauthorized access into a device built-in mic to listen to whatever...
Microphone Hacking 101: How It Happens
What is microphone hacking? Microphone hacking is the use of malware by a hacker or third party to gain unauthorized access into a device built-in mic to listen to whatever...
![Juice Jacking 101: How to Keep Your Phone Safe - Securitybase](http://securitybase.com.au/cdn/shop/articles/juice-jacking-101-how-to-keep-your-phone-safe-436836.jpg?v=1719143060&width=533)
Juice Jacking 101: How to Keep Your Phone Safe
Juice Jacking can happen when you plug your device into a USB port to charge your device. Malicious actors can use a USB port to install malware or extract your...
Juice Jacking 101: How to Keep Your Phone Safe
Juice Jacking can happen when you plug your device into a USB port to charge your device. Malicious actors can use a USB port to install malware or extract your...
![Webcam Hacking 101: How To Protect Yourself - Securitybase](http://securitybase.com.au/cdn/shop/articles/webcam-hacking-101-how-to-protect-yourself-362361.jpg?v=1719143062&width=533)
Webcam Hacking 101: How To Protect Yourself
There are many risks related to our activities on the internet. It is expected that cybercrime costs the world over 6 billion dollars in 2021. Thankfully, people are getting more...
Webcam Hacking 101: How To Protect Yourself
There are many risks related to our activities on the internet. It is expected that cybercrime costs the world over 6 billion dollars in 2021. Thankfully, people are getting more...
![10 Common Types of Cybercrime - Securitybase](http://securitybase.com.au/cdn/shop/articles/10-common-types-of-cybercrime-509333.jpg?v=1719143064&width=533)
10 Common Types of Cybercrime
As technology continues to become a more significant part of our lives, so does cybercrime. Cybercrime costs individuals, businesses, and governments billions of dollars. The Australian Cyber Security Centre (ACSC)...
10 Common Types of Cybercrime
As technology continues to become a more significant part of our lives, so does cybercrime. Cybercrime costs individuals, businesses, and governments billions of dollars. The Australian Cyber Security Centre (ACSC)...