top of page

Ready to unlock the power of aerial environmental intelligence?
Follow our Blog
Catch all the latest news in cybersecurity, endpoint security, malware and anti-virus threats by signing up for our Blog.
When you sign up we will send you an email notification to alert you to a new post so you won't miss a thing.


Choosing the Best Antivirus Software in Australia: Why Sophos Intercept X Advanced Stands Above the Rest
If you search for “best antivirus software in Australia,” you’ll quickly find familiar names like Norton, Bitdefender, AVG, ESET and Avira. These products dominate comparison lists because they’re easy to install, reasonably priced, and packed with extra features like VPNs and password managers.
But here’s the uncomfortable truth: Learn about it in our latest blog...

Jason Riley
1 day ago3 min read


The Ultimate New Device Setup Guide — Stay Cyber-Safe from Day One
Got a new smartphone, tablet, laptop or smart device? Congratulations! But before you dive in, take a few minutes to setup your device securely and protect your personal info, identity and digital life from cyber threats.
Here’s a simple, practical checklist designed for Australians, to help you stay safe, secure and connected.

Jason Riley
3 days ago2 min read


Are Chinese Vehicles a Security Risk?What Australian Authorities Are Really Saying — and What Consumers Should Know
Australian drivers are buying more connected vehicles than ever before. Many of them are electric. Many are made by Chinese manufacturers.
That combination has raised questions about data security, privacy, and national interest, and while social media is full of speculation, Australian authorities have taken a far more measured approach.
So what are Australian security agencies actually saying?

Jason Riley
Jan 93 min read


Microsoft is the Most Spoofed Brand in Phishing Scams
New cybersecurity research shows that Microsoft has become the most impersonated brand in phishing attacks worldwide. Cybercriminals are using fake emails and websites that look like legitimate Microsoft communications to trick Australians into handing over personal information, including passwords, payment details, and account access. This trend highlights how important it is for people and businesses of all ages to recognise cunning scams and protect themselves online.

Jason Riley
Jan 72 min read


Why Software Updates Matter for Tradies & Sole Traders
If you’re a tradie or sole trader, software updates are probably low on your priority list. You’ve got jobs to quote, invoices to send, tools to maintain, and customers waiting.
An update that pops up during the workday feels like bad timing. However, skipping updates is one of the biggest cyber risks facing tradies and one-person businesses in Australia. Cyber criminals actively target sole traders because they know time is tight, and systems are often left unpatched.

Jason Riley
Dec 18, 20253 min read


Practical Guide to Password Managers
In today’s digital world, most of us have dozens of online accounts — from banking to shopping to social media. Using the same password everywhere, or easy-to-guess ones, makes it much easier for cyber criminals to break in and steal your identity, money or data.
That’s where password managers come in.

Jason Riley
Dec 15, 20252 min read


How to Enjoy Christmas — Without Letting Scammers Crash the Party
The Christmas holiday season brings joy, generosity, and… a flurry of online activity. For many Australians, that means gifts, online shopping, festive greetings, and maybe a new device or two. But it can also attract cyber-scammers looking to take advantage of the hurry and goodwill.
At Arafura Consulting & Media, we believe — Smart • Secure • Connected — means enjoying the holidays safely.
Here’s how you (and your loved ones) can stay protected online this festive seaso

Jason Riley
Dec 9, 20253 min read


1.3 Billion Passwords Leaked: What Australians Need to Know and Do Now
A newly compiled collection of 1.3 billion unique passwords and 2 billion unique email addresses has been discovered online.
This data wasn’t stolen in a single “big breach” of a company or service. Instead, it’s an aggregate, compiled by the threat intelligence firm Synthient, which scoured both the open and dark web to collect credentials from hundreds of past data breaches, lists used for “credential-stuffing,” and logs from malware-infected devices.

Jason Riley
Dec 4, 20253 min read


Big Tech Bugs and Cyber Safety for Small Business
Even the biggest names in technology can slip up, and this week’s headlines prove it. Oracle released an emergency fix after hackers found a way to exploit one of its business systems. Researchers uncovered a new cloud vulnerability that could, in rare cases, allow data to leak between shared servers. And Microsoft quietly announced a change to Outlook, disabling a type of image file that cybercriminals were using in phishing scams. It’s a busy week in cybersecurity -

Jason Riley
Oct 8, 20252 min read
bottom of page