Category : Search result: cyber security breach


Ring Video Doorbell 50% Off on Amazon AU

Shoppers are raving about the Ring Video Doorbell, now half price on Amazon Australia. See, hear, and speak to visitors from your phone for home security.

Six Foreign Nationals Found in Remote Kimberley

Six foreign nationals, believed to be Chinese, have been detained in WA's remote Kimberley after arriving by boat. Get the latest on this developing border security incident.

My Aged Care data leak sparks sales call barrage

Elderly Australians are being bombarded with aggressive sales calls after unscrupulous aged care providers scraped their private data from a government website. Learn how to protect yourself.

SA's $5bn Desal Plant Site Chosen, Defying Report

South Australia has selected a site for its $5 billion desalination plant, a decision that goes against a 2023 report which favoured Cape Hardy on the Eyre Peninsula. Read the full details.

Sennheiser Headphones Drop to $249 for Cyber Monday

Aussie shoppers are ditching in-ear buds for premium over-ear headphones. The top-rated Sennheiser Momentum 4 Wireless, praised for comfort and noise cancellation, is now 43% off at Amazon Australia. Grab the deal!

Echo Hub $199 in Cyber Monday Tech Sale

Amazon's Echo Hub drops to $199 for Cyber Monday, a 40% saving. This smart home controller unifies your devices, works offline & simplifies daily life. Grab the deal!

Ecovacs Robovac 53% Off in Cyber Monday Sale

Amazon Australia's Cyber Monday sale features the Ecovacs Deebot T50 Omni robovac at a stunning 53% discount. Down from $1,499 to just $699, this limited-time offer is a must for Aussie homes.

$40M Geelong Water Pipeline Upgrade Complete

Geelong's drinking water supply secured after major $40 million pipeline upgrades. Critical infrastructure improvements ensure reliable water for growing population.

277 Victorian School Lockdowns in Single Year

Shocking FOI data reveals Victorian schools endured 277 lockdowns last year, with violent threats forcing students into terrifying security protocols. Read the full investigation.

Page 2 of 4