A newly discovered cyber vulnerability could be putting hundreds of millions of cable modems at risk, according to a group of Danish security researchers.
Nearly four out of every 10 cameras are vulnerable to a cyber attack, according to research by Genetec.
The Australian Academy of Technology and Engineering has urged the government to focus on cyber resilience while developing its 2020 Cyber Security Strategy.
A new report from BlackBerry's Cylance found that several governments have been exploiting the mobile threat landscape for at least a decade.
The board of UK-based security company Sophos will unanimously recommend a US$3.82bn takeover offer from US private equity company Thoma Bravo.
Canberra-based Penten and the CSIRO's Data61 will collaborate to support research and development on cyber decoy and cyber trap capabilities.
The ANU has published a forensic investigation into what VC Brian Schmidt has called a "shockingly sophisticated" targeted cyber attack on its systems.
CDN and cloud service provider Akamai has opened a new DDoS attack traffic scrubbing centre in Melbourne to complement its existing facility in Sydney.
The Association of IT Asset Management has urged the US government to act on a report finding pervasive cybersecurity failures across US federal agencies.
Following reports of preventable incidents, the Australian Cyber Security Centre is urging network operators to sign up to the free Australian Internet Security Initiative.
An analysis of Huawei firmware claims to have found potential backdoors in more than half of the vendor's devices.
Huawei has filed a motion for summary judgement in a US lawsuit challenging the constitutionality of a law restricting US companies from doing business with the vendor.
Choosing the right antivirus solution for your business is an important decision that can save your business money, reputation and stability in the long-term.
The federal government has announced a wide-ranging $156 million investment in cybersecurity as an election promise.
Russian state-sponsored actors are on average able to infiltrate a target's network in under 19 minutes after compromising the first system, CrowdStrike said.