Security > Cybercrime

Old IE support ends; BlueScope's espionage worries; BoM's outage woes

19 January, 2016 by Andrew Collins

Support ends for older versions of Internet Explorer; Bluescope's internal espionage case; and the Bureau of Met suffers a meltdown.


Cybercriminals to change how they operate in 2016

14 December, 2015 by Dylan Bushell-Embling

Bitdefender is predicting significant changes to the business of cybercrime in 2016, with APTs focusing more on obfuscation than persistence and malicious adware becoming more popular.


'Cybersecurity tick' scheme for SMEs

11 December, 2015

New Zealand businesses with good cybersecurity practices could receive a 'cybersecurity tick' under a proposed scheme to encourage SME action against cyber attacks.


Telstra is launch customer for Wynyard's cyber solution

18 November, 2015

Telstra has inked a NZ$3.2 million deal with Wynyard Group to use its new Advanced Cyber Threat Analytics solution to seek out cyberthreats inside its networks.


Britain to track every website users visit

06 November, 2015 by Dylan Bushell-Embling

Britain has announced plans for widespread new surveillance powers including a requirement for local ISPs to store the records of all websites a user navigates to.


The M-Trends report 2015: cutting-edge cybersecurity research

23 October, 2015

The M-Trends report for 2015 provides unique insight and analysis on how attackers' motives and tactics are changing. From the collation of hundreds of critical security incidents over 30 industries, it is evident that organisations allow attackers to linger far too long in compromised environments.


Consumers face "internet tax" from data retention law

20 October, 2015 by Dylan Bushell-Embling

Internet Australia has warned that consumers will be hardest hit by the true costs associated with the new mandatory metadata retention law if the government fails to adequately compensate the industry.


Kmart, David Jones among the latest cyber attack victims

07 October, 2015 by Dylan Bushell-Embling

In a matter of weeks, Kmart and David Jones — as well as Patreon and T-Mobile USA overseas — have fallen victim to cyber attacks, while new threats including a variant of the notorious Carbanak malware have surfaced.


Security roundup: APTs, account abuse and DDoS attacks

02 October, 2015 by Dylan Bushell-Embling

35% of Australian organisations are exposed to APTs; Privileged account abuse one of the main threats to corporate security; Botnet capable of 150 Gbps+ DDoS attacks in the wild


One in four US IT managers would become hacker

16 September, 2015 by Dylan Bushell-Embling

One in four US IT decision-makers would become a black-hat hacker for US$2000 or less, and a similar proportion hear more about office happy hours than about IT security, a survey suggests.


EFA calls for halt on ISP Copyright Code

09 September, 2015 by Dylan Bushell-Embling

With new research showing that online piracy is on the decline as adoption of subscription video services grows, EFA has repeated its call for the ISP Copyright Code to be halted.


The 5 most dangerous threats to your data centre today

01 September, 2015

Possessing the most valuable and visible property of your organisation — your web, DNS, database and email servers — data centres have become the number one target of cybercriminals, hacktivists and state-sponsored attackers.


Kaspersky allegedly sabotaged rivals; Salesforce plugs security flaw; Lenovo laptops' dodgy firmware

20 August, 2015 by Andrew Collins

Kaspersky Labs denies reports it tried to damage rivals, Salesforce patches takeover vulnerability and Lenovo stops shipping exploitable laptops.


Cybercrooks targeting Australia get more inventive

20 August, 2015 by Dylan Bushell-Embling

While the number of malicious URLs clicked by Australians fell significantly during Q2, attackers turned to more creative ways of using existing exploits such as macros and exploit kits.


Avoid cyber attacks concealed within encrypted traffic

14 August, 2015

Although encrypted traffic improves privacy, it provides hackers with the opportunity to conceal their exploits from security software that does not inspect SSL traffic. Hackers can evade over 80% of companies’ network security simply by tunnelling attacks in encrypted traffic.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd