Old IE support ends; BlueScope's espionage worries; BoM's outage woes
19 January, 2016 by Andrew CollinsSupport ends for older versions of Internet Explorer; Bluescope's internal espionage case; and the Bureau of Met suffers a meltdown.
Cybercriminals to change how they operate in 2016
14 December, 2015 by Dylan Bushell-EmblingBitdefender is predicting significant changes to the business of cybercrime in 2016, with APTs focusing more on obfuscation than persistence and malicious adware becoming more popular.
'Cybersecurity tick' scheme for SMEs
11 December, 2015New Zealand businesses with good cybersecurity practices could receive a 'cybersecurity tick' under a proposed scheme to encourage SME action against cyber attacks.
Telstra is launch customer for Wynyard's cyber solution
18 November, 2015Telstra has inked a NZ$3.2 million deal with Wynyard Group to use its new Advanced Cyber Threat Analytics solution to seek out cyberthreats inside its networks.
Britain to track every website users visit
06 November, 2015 by Dylan Bushell-EmblingBritain has announced plans for widespread new surveillance powers including a requirement for local ISPs to store the records of all websites a user navigates to.
The M-Trends report 2015: cutting-edge cybersecurity research
23 October, 2015The M-Trends report for 2015 provides unique insight and analysis on how attackers' motives and tactics are changing. From the collation of hundreds of critical security incidents over 30 industries, it is evident that organisations allow attackers to linger far too long in compromised environments.
Consumers face "internet tax" from data retention law
20 October, 2015 by Dylan Bushell-EmblingInternet Australia has warned that consumers will be hardest hit by the true costs associated with the new mandatory metadata retention law if the government fails to adequately compensate the industry.
Kmart, David Jones among the latest cyber attack victims
07 October, 2015 by Dylan Bushell-EmblingIn a matter of weeks, Kmart and David Jones — as well as Patreon and T-Mobile USA overseas — have fallen victim to cyber attacks, while new threats including a variant of the notorious Carbanak malware have surfaced.
Security roundup: APTs, account abuse and DDoS attacks
02 October, 2015 by Dylan Bushell-Embling35% of Australian organisations are exposed to APTs; Privileged account abuse one of the main threats to corporate security; Botnet capable of 150 Gbps+ DDoS attacks in the wild
One in four US IT managers would become hacker
16 September, 2015 by Dylan Bushell-EmblingOne in four US IT decision-makers would become a black-hat hacker for US$2000 or less, and a similar proportion hear more about office happy hours than about IT security, a survey suggests.
EFA calls for halt on ISP Copyright Code
09 September, 2015 by Dylan Bushell-EmblingWith new research showing that online piracy is on the decline as adoption of subscription video services grows, EFA has repeated its call for the ISP Copyright Code to be halted.
The 5 most dangerous threats to your data centre today
01 September, 2015Possessing the most valuable and visible property of your organisation — your web, DNS, database and email servers — data centres have become the number one target of cybercriminals, hacktivists and state-sponsored attackers.
Kaspersky allegedly sabotaged rivals; Salesforce plugs security flaw; Lenovo laptops' dodgy firmware
20 August, 2015 by Andrew CollinsKaspersky Labs denies reports it tried to damage rivals, Salesforce patches takeover vulnerability and Lenovo stops shipping exploitable laptops.
Cybercrooks targeting Australia get more inventive
20 August, 2015 by Dylan Bushell-EmblingWhile the number of malicious URLs clicked by Australians fell significantly during Q2, attackers turned to more creative ways of using existing exploits such as macros and exploit kits.
Avoid cyber attacks concealed within encrypted traffic
14 August, 2015Although encrypted traffic improves privacy, it provides hackers with the opportunity to conceal their exploits from security software that does not inspect SSL traffic. Hackers can evade over 80% of companies’ network security simply by tunnelling attacks in encrypted traffic.