Security > Cybercrime

Apple iCloud users urged to change passwords

29 May, 2014

Owners of Apple devices are having their accounts blocked and are receiving ransom demands from hackers who appear to have compromised Apple's iCloud security.


International drill held to fight off cyberattacks

26 May, 2014

Nineteen countries have come together in Turkey to hold an international exercise aimed at strengthening international cybersecurity preparedness.


Online casinos used to launder cybercrime money

29 April, 2014 by Dylan Bushell-Embling

Due to the popularity and anonymity of online gambling sites, cybercriminals have started using them to launder money and pay for services on the black market, according to McAfee.


Nine threat patterns account for 92% of all security incidents

23 April, 2014 by Dylan Bushell-Embling

Verizon security researchers have applied big data analytics to 10 years of security incident reports, and found that 92% of attacks can be traced to nine threat patterns.


New Spanish cyber threat may be nation-state-sponsored

13 February, 2014

Security researchers have uncovered a potentially nation-state-sponsored, Spanish language-based cyber threat that has been active since at least 2007.


Yahoo provides little detail on Yahoo Mail attack

04 February, 2014

Cybercrims have undertaken a "coordinated" campaign to break into some number of Yahoo Mail accounts, but Yahoo has released scant details on the specifics of the attack, including how many accounts were targeted.


Is your fridge really a spambot in disguise?

27 January, 2014 by Dylan Bushell-Embling

While some pundits are questioning the accuracy of a report claiming IoT devices, including a smart fridge, were compromised to send malicious emails, there's little question that the threat is credible.


Snowden, espionage shape security landscape in '13

04 December, 2013 by Dylan Bushell-Embling

The revelations of whistleblower Edward Snowden and the emergence of cyber-mercenaries were two of this year's key cybersecurity trends.


Victorian Government unprepared for cyberattacks

03 December, 2013

Victorian government agencies are underprepared to deal with cyberattacks on their ICT systems, according to a report from the state's auditor-general.


Hackers steal $1 million from Aussie bitcoin service

12 November, 2013 by Andrew Collins

Hackers have stolen more than $1 million dollars' worth of bitcoins from an Australian bitcoin wallet service, according to the operator of the service.


'Silver surfers' exposed to cybercrime

11 November, 2013 by Dylan Bushell-Embling

Older Australians are using the internet nearly as often as teenagers, but a lack of awareness about cybercrime risk is leaving them vulnerable to fraud.


Kylie is most dangerous Aussie celeb to search for

19 September, 2013 by Dylan Bushell-Embling

Kylie Minogue has supplanted her sister Dannii as the most dangerous Australian celebrity to search for information about online, a McAfee study shows.


Largest cyberattack ever; Dell in three-way buyout bidding war; Telecom NZ reveals UFB plans

02 April, 2013 by Andrew Collins

In the news this week: spam-fighter Spamhaus comes under largest cyberattack ever, two new Dell suitors enter the picture and Telecom New Zealand reveals pricing for its Ultra-Fast Broadband services.


The threat matrix

19 March, 2013 by Anthony Caruana

Security is always high up on the list of issues IT decision makers need to manage. One of the most challenging aspects of security is that the types of threats are changing and the environment we’re protecting is shifting as mobility, the cloud and other trends alter the way we work. Anthony Caruana spoke with four security gurus to get their views on the changing threat matrix.


Passwords can be harvested from PCs in standby mode

21 August, 2012

When a computer is switched off, any passwords you used to login to web pages, banks or other financial accounts evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole that exploits the way computer memory works and could be used to harvest passwords and other sensitive data from a PC even if it is in standby mode.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd