Adobe Flash Player zero day attack targets defence manufacturers
07 May, 2012Cybercriminals are exploiting a vulnerability in Adobe Flash Player in a targeted attack on manufacturers of defence products. According to Symantec, the attackers will soon cast a broader net aimed at a wider variety of organisations.
Booter shell scripts turn DDoS attacks into child’s play, warns Prolexic
27 April, 2012DDoS protection service provider Prolexic Technologies has, today, released a threat advisory on the use of booter shells, which allow hackers to launch distributed denial of service (DDoS) attacks without the need for vast networks of infected zombie computers.
5 tips to beat business phone fraud
23 March, 2012Telstra Business has sent warnings to its customers and issued a list of security tips following an increase in cases of hackers gaining unauthorised access to business phone systems.
Cyber criminals are targeting mobile devices, warns latest AVG report
27 January, 2012Internet and mobile security software distributor AVG has released it's latest Community Powered Threat Report which provides insight, background and analysis on the trends and developments in cybercrime over the previous 3 months. The Q4 2011 report includes the risks of QR codes, stolen digital certificates bypassing security on mobile phones and the persistence of rootkits.
Largest DDoS in 2011 hits Asian organisation
24 November, 2011The largest distributed denial of service (DDoS) attack of 2011 took place two weeks ago, according to Prolexic Technologies, a company that offers DDoS protection services.
Expect more severe DDoS attacks this holiday season
01 November, 2011Distributed denial of service (DDoS) attacks are likely to last longer than usual during the upcoming holiday season, particularly against companies with e-commerce presences.
Expect chaos and catastrophes in security landscape
14 October, 2011 by Merri MackIT departments are being urged to make use of new technologies like social media, mobility, virtualisation and the cloud. Each of these carries new security risks and IT departments must learn new tactics to successfully secure them, as Merri Mack explains.
Eighty per cent of Aussie businesses experience IT security attacks
17 May, 2011Most Australian businesses experienced an IT security attack in 2010, in the form of viruses, worms, phishing attacks or hacks, according to new research from Webroot.
Planes crashing into planes: the reality of cybercrime?
04 April, 2011 by Andrew CollinsSecurity vendors like to throw around various apocalyptic scenarios in order to convince IT and security chiefs to buy the latest security doodads. But how realistic are these scenarios? Andrew Collins spoke to one penetration tester about the likelihood of one particular scenario: hackers compromising an airline’s IT security in order to blow up an aeroplane.
‘Money mule’ scam targets job seekers
29 March, 2011Symantec researchers have detected a new phishing scam that targets job seekers, turns them into inadvertent money launderers and hands unlimited access to their bank accounts over to cybercriminals.
Five business practices that allow cybercriminals to access company data
23 February, 2011The reality of cybercrime is that many businesses make it easy for both malicious and inadvertant breaches of company IT security to occur. Rigorous adoption, implementation and enforcement of in-house security guidelines can help limit the threats to data security. These five tips are a good place to start.
A decade of cybercrime
11 February, 2011Since 2000, the number of internet users has grown fivefold from 361 million to 2 billion in 2011. We’ve also seen explosive growth in services and products available online. Today, almost any activity - from personal banking to shopping and social networking - can be carried out over the internet. As such, it has become a treasure trove of money and information that cybercriminals can exploit for their personal gain.
Cyber security spurns evaluation centre
08 December, 2010With cybercrime becoming rife, Huawei has opened a cyber security evaluation centre in the UK to ensure its hardware and software systems will be tested to withstand cyber security threats.
Challenge for the cloud
17 November, 2010The ease of use and accessibility have made cloud computing a popular concept. Now, with the onset of the cloud computing era, it will be up to law enforcement officials, particularly in computer crime forensics, to keep cloud safe for all users.
Telstra faces up to Cyber Storm test
30 September, 2010Working closely with government, enterprise customers and industry organisations, Telstra is ready to be put to the test by Cyber Storm III - an international cyber security exercise.