Security > Cybercrime

Adobe Flash Player zero day attack targets defence manufacturers

07 May, 2012

Cybercriminals are exploiting a vulnerability in Adobe Flash Player in a targeted attack on manufacturers of defence products. According to Symantec, the attackers will soon cast a broader net aimed at a wider variety of organisations.


Booter shell scripts turn DDoS attacks into child’s play, warns Prolexic

27 April, 2012

DDoS protection service provider Prolexic Technologies has, today, released a threat advisory on the use of booter shells, which allow hackers to launch distributed denial of service (DDoS) attacks without the need for vast networks of infected zombie computers.


5 tips to beat business phone fraud

23 March, 2012

Telstra Business has sent warnings to its customers and issued a list of security tips following an increase in cases of hackers gaining unauthorised access to business phone systems.


Cyber criminals are targeting mobile devices, warns latest AVG report

27 January, 2012

Internet and mobile security software distributor AVG has released it's latest Community Powered Threat Report which provides insight, background and analysis on the trends and developments in cybercrime over the previous 3 months. The Q4 2011 report includes the risks of QR codes, stolen digital certificates bypassing security on mobile phones and the persistence of rootkits.


Largest DDoS in 2011 hits Asian organisation

24 November, 2011

The largest distributed denial of service (DDoS) attack of 2011 took place two weeks ago, according to Prolexic Technologies, a company that offers DDoS protection services.


Expect more severe DDoS attacks this holiday season

01 November, 2011

Distributed denial of service (DDoS) attacks are likely to last longer than usual during the upcoming holiday season, particularly against companies with e-commerce presences.


Expect chaos and catastrophes in security landscape

14 October, 2011 by Merri Mack

IT departments are being urged to make use of new technologies like social media, mobility, virtualisation and the cloud. Each of these carries new security risks and IT departments must learn new tactics to successfully secure them, as Merri Mack explains.


Eighty per cent of Aussie businesses experience IT security attacks

17 May, 2011

Most Australian businesses experienced an IT security attack in 2010, in the form of viruses, worms, phishing attacks or hacks, according to new research from Webroot.


Planes crashing into planes: the reality of cybercrime?

04 April, 2011 by Andrew Collins

Security vendors like to throw around various apocalyptic scenarios in order to convince IT and security chiefs to buy the latest security doodads. But how realistic are these scenarios? Andrew Collins spoke to one penetration tester about the likelihood of one particular scenario: hackers compromising an airline’s IT security in order to blow up an aeroplane.


‘Money mule’ scam targets job seekers

29 March, 2011

Symantec researchers have detected a new phishing scam that targets job seekers, turns them into inadvertent money launderers and hands unlimited access to their bank accounts over to cybercriminals.


Five business practices that allow cybercriminals to access company data

23 February, 2011

The reality of cybercrime is that many businesses make it easy for both malicious and inadvertant breaches of company IT security to occur. Rigorous adoption, implementation and enforcement of in-house security guidelines can help limit the threats to data security. These five tips are a good place to start.


A decade of cybercrime

11 February, 2011

Since 2000, the number of internet users has grown fivefold from 361 million to 2 billion in 2011. We’ve also seen explosive growth in services and products available online. Today, almost any activity - from personal banking to shopping and social networking - can be carried out over the internet. As such, it has become a treasure trove of money and information that cybercriminals can exploit for their personal gain.


Cyber security spurns evaluation centre

08 December, 2010

With cybercrime becoming rife, Huawei has opened a cyber security evaluation centre in the UK to ensure its hardware and software systems will be tested to withstand cyber security threats.


Challenge for the cloud

17 November, 2010

The ease of use and accessibility have made cloud computing a popular concept. Now, with the onset of the cloud computing era, it will be up to law enforcement officials, particularly in computer crime forensics, to keep cloud safe for all users.


Telstra faces up to Cyber Storm test

30 September, 2010

Working closely with government, enterprise customers and industry organisations, Telstra is ready to be put to the test by Cyber Storm III - an international cyber security exercise.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd