Tayven

Silhouette of a curly‑haired figure wearing a black T‑shirt and dark blue jeans, holding a glowing USB drive aloft against a dramatic night sky filled with clouds and stars.

Retro: The Day the Internet Tried to Reboot Me: My Blaster Worm Story (2003)

When My PC Suddenly Turned Into a Countdown Timer If you were online in 2003, you probably remember this moment. I was sitting at my computer, Windows XP humming away, dial‑up screeching in the background when suddenly my screen froze and a Windows dialog box popped up: “Windows must now restart because the Remote Procedure […]

Retro: The Day the Internet Tried to Reboot Me: My Blaster Worm Story (2003) Read More »

A metallic cyber‑themed “The Build Log” logo featuring a chrome gear, glowing circuit lines, and a digital progress bar.

Build Log #2 – Designing for Real People, Not Just Screens

Version 1 of the site is officially live, and this week was all about turning a rough layout into something that actually works for real people. Not just on a big desktop monitor, but on the device most visitors will use first: their phone. Accessibility and usability aren’t optional anymore, they’re the baseline so this

Build Log #2 – Designing for Real People, Not Just Screens Read More »

Cracked smartphone on a dark table at night displaying a text message notification that says “Hi Dad,” symbolising the start of a scam.

“Hi Dad, I Dropped My Phone”: How a Simple Text Stole $3600 And Why This Scam Is Exploding

A Real Incident Response Case This wasn’t a hypothetical scenario or a second‑hand story, it was a real incident I handled during an incident response call. These impersonation scams are not targeted attacks; they’re mass‑sent messages blasted out to thousands of numbers at once, hoping that one or two people respond at the wrong moment.

“Hi Dad, I Dropped My Phone”: How a Simple Text Stole $3600 And Why This Scam Is Exploding Read More »

Essential 8 Explained title graphic showing blue text and eight minimalist security icons representing each control.

The Essential 8 Explained Like You’re New to Cyber (But Want to Actually Understand It)

If you work in Australia, you’ve probably heard someone mention the ACSC Essential 8 in a meeting, usually right before everyone nods like they understand what’s going on. Spoiler: most people don’t. The Essential 8 is Australia’s baseline cyber security framework, a minimum and a voluntary baseline standard organisations can adopt to meet their cyber

The Essential 8 Explained Like You’re New to Cyber (But Want to Actually Understand It) Read More »

Silhouette wearing a backpack and cap facing a glowing digital horizon with blue and gold data streams converging into light.

How to Get Into Cyber Security: How I Broke In After 15 Years in IT

People love to say you can “break into cyber in 90 days.” Others act like you need a decade of networking experience, a CCIE, and a blood oath under a full moon just to be considered. The truth sits somewhere in the middle, and my story lives firmly in the slow, steady, human category. I

How to Get Into Cyber Security: How I Broke In After 15 Years in IT Read More »

Shield-shaped logo for the Patch Management Series featuring a computer monitor with patch icons, crossed wrench and screwdriver, and circuit lines extending outward.

APRIL 2026 SECURITY PATCH ROUNDUP – Windows, iOS, macOS, Android, Linux

This month’s roundup covers the latest security updates from Microsoft, Apple, Google, and the major Linux distributions. Inside you’ll find the new Windows KB release, Apple’s iOS and macOS security fixes (including the DarkSword patch), Google’s April Android bulletin, and the current security advisories from Ubuntu. The report outlines the key vulnerabilities addressed across each

APRIL 2026 SECURITY PATCH ROUNDUP – Windows, iOS, macOS, Android, Linux Read More »

Shield-shaped logo for the Patch Management Series featuring a computer monitor with patch icons, crossed wrench and screwdriver, and circuit lines extending outward.

Introducing the Patch Management Series

Every month, the major platforms we rely on release security updates that quietly close the gaps attackers love to exploit. Most people never read the advisories. Most organisations don’t have time to track five different ecosystems. That’s why this series exists. Threat‑intel from early 2026 shows attackers are exploiting critical vulnerabilities twice as often and

Introducing the Patch Management Series Read More »

A university student with curly hair and a hoodie stands at a crossroads facing a slightly open wooden university door glowing with soft blue light.

4 Ways I Got Uni for Free and Got Paid to Study (Without Being a Genius or Gaming the System)

Most people enter tech with a HECS debt, a personal loan, or a quiet sense of financial dread. I accidentally did the opposite. Every qualification I’ve earned, TAFE, university, under‑grad and post‑grad ended up costing me almost nothing. Not because I’m a genius. Not because I gamed the system. But because I learned one simple

4 Ways I Got Uni for Free and Got Paid to Study (Without Being a Genius or Gaming the System) Read More »