Guide to securing personal information

Haythem Elmir

  Introduction This ‘Guide to securing personal information’ (Guide) provides guidance on the reasonable steps entities are required to take under the Privacy Act 1988 (Cth) (Privacy Act) to protect the personal information they hold from misuse, interference, loss, and from unauthorised access, modification or disclosure. It also includes guidance […]

TUNISIA BIG DATA HACKATHON 07 & 08 OCTOBRE 2017

Haythem Elmir

TUNISIA BIG DATA HACKATHON 07 & 08 OCTOBRE 2017 Espace Arena LAC 1 The Tunisian e-government society est une association non gouvernementale, à but non lucratif œuvrant pour une implémentation éclairée des politiques de transformation administrative par l’usage des technologies du numérique. Tunisia Big Data Hackathon 2017 serait le 1er challenge en Tunisie qui […]

Apple’s iOS 11 release prevents backdoor exploit on Wi-Fi chips

Haythem Elmir

Apple’s release of iOS 11 patched an out-of-bounds write vulnerability in Wi-Fi chips that, if exploited, could have allowed attackers within range to execute arbitrary code on the firmware. Designated CVE-2017-11120, the bug was discovered by team researcher Gal Beniamini, and is comparable to the Broadpwnvulnerability found in Broadcom chipsets earlier this year. Following Apple’s Sept. […]

More Mac malware than ever before

Haythem Elmir

Malware isn’t a problem on Macs, is it? You might think so. But that’s not a very safe assumption. Macs have been on malware writers’ radar for a long time. And the trend seems to be increasing. Research from Malwarebytes shows that attacks against macOS are growing. More Mac malware was detected in […]