Security

How to mitigate damage from a distributed denial of service (DDoS) attack

15 May, 2012 by Neal Quinn, Chief Operating Officer, Prolexic

Across the internet, distributed denial of service (DDoS) attacks continue to increase in size and intensity. Businesses can minimise the damage from a DDoS with a well rehearsed DDoS mitigation plan, or 'playbook'.


Adobe Flash Player zero day attack targets defence manufacturers

07 May, 2012

Cybercriminals are exploiting a vulnerability in Adobe Flash Player in a targeted attack on manufacturers of defence products. According to Symantec, the attackers will soon cast a broader net aimed at a wider variety of organisations.


ESET Endpoint Security Suite for cybersecurity

07 May, 2012

ESET’s Endpoint Security Suite has been designed to provide ongoing protection against cybersecurity threats. The small system footprint, coupled with remote management of clients, make the solutions suitable for companies of all sizes.


Logicalis Virtual Workspace offers Citrix/Cisco solution to BYOD

30 April, 2012

Logicalis Virtual Workspace (LVW) combines Cisco and Citrix desktop and application virtualisation, voice and video technology via a small footprint, virtual environment, combined with mobile device management to address the security, storage, cost and productivity concerns around bring your own device (BYOD) computing and mobile workforces.


Booter shell scripts turn DDoS attacks into child’s play, warns Prolexic

27 April, 2012

DDoS protection service provider Prolexic Technologies has, today, released a threat advisory on the use of booter shells, which allow hackers to launch distributed denial of service (DDoS) attacks without the need for vast networks of infected zombie computers.


Fake Instagram app infecting Android devices warns Sophos

20 April, 2012

Cybercriminals are creating fake versions of popular smartphone apps, such as Angry Birds and the popular photo-sharing app Instagram, as a way to distribute their malware and earn money from unsuspecting users, warns IT security and data protection company Sophos.


Is Google's Bouncer enough to deter Android hackers and malware developers?

05 April, 2012 by Alexandru Balan*, Senior Product Manager, Bitdefender

Google’s Android is fast becoming the most popular mobile OS in the world. But the operating system’s security profile does not match its popularity - its open architecture and its ability to install applications from third party sources make it a target for malicious minds. Google’s recently announced ‘Bouncer’ program will increase Android security somewhat - but does it go far enough? Bitdefender's Alexandru Balan weighs in on the topic.


Cost of data breaches continues to rise

30 March, 2012

The average cost of data breaches on Australian organisations has risen for the third year in a row, reaching $2.16 million in 2011, according to a study from Symantec and the Ponemon Institute.


Blue Coat Unified Web Security cross-network protection

29 March, 2012

Unified Web Security is claimed to enable an organisation to expand its secure perimeter to users in any location, on any network, across any device, to close the security gaps that leave them exposed to malware threats and data loss.


5 tips to beat business phone fraud

23 March, 2012

Telstra Business has sent warnings to its customers and issued a list of security tips following an increase in cases of hackers gaining unauthorised access to business phone systems.


Internet Explorer, Chrome and Safari exploit puts SharePoint and LinkedIn data at risk

14 March, 2012

Users of Internet Explorer, Chrome and Safari are vulnerable to a new attack that lets remote attackers steal sensitive information held on private Microsoft SharePoint sites, as well as mine data from other public websites such as LinkedIn.


McAfee Enterprise Mobility Management (EMM) 10.0

13 March, 2012

Enterprise Mobility Management (EMM) 10.0 includes security updates for enterprise customers, providing IT with improved control to identify, secure and assign policies to both employee- and business-owned smartphones and tablets, to support BYOD practices.


Sophos SafeGuard Encryption for Cloud Storage

12 March, 2012

SafeGuard Encryption for Cloud Storage automatically encrypts files uploaded to the cloud from any managed endpoint, reinforcing ‘protection everywhere’ peace of mind. This simple process requires little more than choosing a password to allow secure file access from anywhere.


Outback supermarket chain deploys secure two-way satellite services

12 March, 2012

Outback Stores is a company that manages remote stores on behalf of Australian Indigenous communities in the Northern Territory, Western Australia and South Australia. The company has deployed network and security solutions to securely connect its many remote locations.


Half of Australian organisations lose data through mobile devices

08 March, 2012

A global study on mobility risks, conducted by the Ponemon Institute and sponsored by content security provider Websense, has revealed that corporate mobile devices and employee-owned devices (bring-your-own-devices) are circumventing enterprise security and mobile device usage policies in Australia.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd