Security

Fake Instagram app infecting Android devices warns Sophos

20 April, 2012

Cybercriminals are creating fake versions of popular smartphone apps, such as Angry Birds and the popular photo-sharing app Instagram, as a way to distribute their malware and earn money from unsuspecting users, warns IT security and data protection company Sophos.


Is Google's Bouncer enough to deter Android hackers and malware developers?

05 April, 2012 by Alexandru Balan*, Senior Product Manager, Bitdefender

Google’s Android is fast becoming the most popular mobile OS in the world. But the operating system’s security profile does not match its popularity - its open architecture and its ability to install applications from third party sources make it a target for malicious minds. Google’s recently announced ‘Bouncer’ program will increase Android security somewhat - but does it go far enough? Bitdefender's Alexandru Balan weighs in on the topic.


Cost of data breaches continues to rise

30 March, 2012

The average cost of data breaches on Australian organisations has risen for the third year in a row, reaching $2.16 million in 2011, according to a study from Symantec and the Ponemon Institute.


Blue Coat Unified Web Security cross-network protection

29 March, 2012

Unified Web Security is claimed to enable an organisation to expand its secure perimeter to users in any location, on any network, across any device, to close the security gaps that leave them exposed to malware threats and data loss.


5 tips to beat business phone fraud

23 March, 2012

Telstra Business has sent warnings to its customers and issued a list of security tips following an increase in cases of hackers gaining unauthorised access to business phone systems.


Internet Explorer, Chrome and Safari exploit puts SharePoint and LinkedIn data at risk

14 March, 2012

Users of Internet Explorer, Chrome and Safari are vulnerable to a new attack that lets remote attackers steal sensitive information held on private Microsoft SharePoint sites, as well as mine data from other public websites such as LinkedIn.


McAfee Enterprise Mobility Management (EMM) 10.0

13 March, 2012

Enterprise Mobility Management (EMM) 10.0 includes security updates for enterprise customers, providing IT with improved control to identify, secure and assign policies to both employee- and business-owned smartphones and tablets, to support BYOD practices.


Outback supermarket chain deploys secure two-way satellite services

12 March, 2012

Outback Stores is a company that manages remote stores on behalf of Australian Indigenous communities in the Northern Territory, Western Australia and South Australia. The company has deployed network and security solutions to securely connect its many remote locations.


Sophos SafeGuard Encryption for Cloud Storage

12 March, 2012

SafeGuard Encryption for Cloud Storage automatically encrypts files uploaded to the cloud from any managed endpoint, reinforcing ‘protection everywhere’ peace of mind. This simple process requires little more than choosing a password to allow secure file access from anywhere.


Half of Australian organisations lose data through mobile devices

08 March, 2012

A global study on mobility risks, conducted by the Ponemon Institute and sponsored by content security provider Websense, has revealed that corporate mobile devices and employee-owned devices (bring-your-own-devices) are circumventing enterprise security and mobile device usage policies in Australia.


McAfee report finds malicious sites nearly double and mobile malware continues to grow

23 February, 2012

The McAfee Threats Report Q4 2011 has found malware sample results that surpass its 75 million 2011 prediction, an almost doubling of malicious sites, an increase in mobile (particularly Android) malware, rootkits and botnets (Cutwail and Grum), and a decrease in global spam.


Thales nShield HSM integrated with Infoblox DNS

14 February, 2012

The Thales nShield hardware security module (HSM) has been integrated with the Infoblox DNS platform to address common DNSSEC deployment challenges and enable service providers, government departments, financial institutions and other organisations to secure their online identities more easily and protect critical services against cyberthreats.


50 ‘hacktivist’ amateur DDoS tools analysed

08 February, 2012

Network security vendor Arbor Networks has published a visual review of DDoS tools that are used by hacktivist’ collectives - groups that hack into computers and organisations as a form of political protest.


Two-thirds of web apps at risk of hacking

03 February, 2012

Two-thirds of web applications tested by security consultants at Context Information Security in 2011 were found to be at risk from cross-site scripting, the consultancy firm announced today. On top of that, nearly one in five web applications risked attacks by experienced SQL injections.


Cyber criminals are targeting mobile devices, warns latest AVG report

27 January, 2012

Internet and mobile security software distributor AVG has released it's latest Community Powered Threat Report which provides insight, background and analysis on the trends and developments in cybercrime over the previous 3 months. The Q4 2011 report includes the risks of QR codes, stolen digital certificates bypassing security on mobile phones and the persistence of rootkits.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd