Security

Planes crashing into planes: the reality of cybercrime?

04 April, 2011 by Andrew Collins

Security vendors like to throw around various apocalyptic scenarios in order to convince IT and security chiefs to buy the latest security doodads. But how realistic are these scenarios? Andrew Collins spoke to one penetration tester about the likelihood of one particular scenario: hackers compromising an airline’s IT security in order to blow up an aeroplane.


‘Money mule’ scam targets job seekers

29 March, 2011

Symantec researchers have detected a new phishing scam that targets job seekers, turns them into inadvertent money launderers and hands unlimited access to their bank accounts over to cybercriminals.


ACMA takes aim at telemarketing scammers

25 March, 2011

A new compliance campaign from ACMA will help stop telemarketing scammers purporting to be from antivirus companies who infect consumers’ computers with malware and steal users’ personal information.


RSA SecureID breach could put customers at risk

22 March, 2011

EMC announced last week that its SecureID system had been breached. According to one security consultancy, this breach may have completely compromised the two-factor authentication product, exposing customers’ systems to attack.


Kaspersky Lab security software

14 March, 2011

Kaspersky Lab products, Endpoint Security 8 for Mac, Endpoint Security 8 for Linux and Kaspersky Endpoint Security 8 for Smartphones, are designed to protect against IT security threats.


NXP Semiconductors/Giesecke & Devrient NFC mobile devices secure interface software

14 March, 2011

NXP Semiconductors and Giesecke & Devrient’s joint software solution offers secure interfaces between the handset, NFC functionality and secure elements such as the SIM card. This solution enables NFC to be integrated securely into mobile handsets based on the Android platform and other operating systems. In addition, the validated software will meet the needs of mobile network operators who require secure elements within the handset.


Fortinet FortiGate-3140B consolidated security appliance

14 March, 2011

The FortiGate-3140B consolidated security appliance has been added to the FortiGate product family. The appliance is designed for large enterprises and data centres requiring maximum firewall, virtual private network and intrusion prevention system (IPS) performance to optimise protection against blended threats, destructive malware and constantly evolving attempts to breach security in high-speed network environments.


Fortinet FortiOS 4.0 operating system

14 March, 2011

The FortiOS 4.0 operating system has been added to the FortiGate product family. The operating system introduces wireless controller extensions that support automatic provisioning of wireless access points, detection and suppression of rogue access points, multiple authentication methods and strengthened unified management of both wired and wireless networks from a single FortiGate platform.


Axway SecureTransport enterprise clustering

14 March, 2011

SecureTransport simplifies and secures file transfers between people, sites, applications and external partners, providing visibility into information flows both within and outside of the organisation, while ensuring compliance with global mandates.


McAfee to offer cloud services through new Sydney data centre

09 March, 2011

With the launch of a new data centre in Sydney, McAfee is offering Australian and Asia-Pacific customers access to its global web and email security-as-a-service (SaaS) offerings.


NEC to counteract crime with contactless fingerprint technology

02 March, 2011

NEC has launched one of the world’s first devices to simultaneously acquire fingerprint and finger vein characteristics without physical contact. Dubbed the HS100-10 Contactless Hybrid Finger Scanner (HS100-10), it is scheduled to ship in May 2011.


Five business practices that allow cybercriminals to access company data

23 February, 2011

The reality of cybercrime is that many businesses make it easy for both malicious and inadvertant breaches of company IT security to occur. Rigorous adoption, implementation and enforcement of in-house security guidelines can help limit the threats to data security. These five tips are a good place to start.


EMC names new president of RSA

17 February, 2011

Tom Heiser has been named as President of RSA, the security division of EMC.


Smartphone users unaware of security risks

16 February, 2011

A new survey reveals that over a third of smartphone users are not aware of the security risks associated with their devices.


A decade of cybercrime

11 February, 2011

Since 2000, the number of internet users has grown fivefold from 361 million to 2 billion in 2011. We’ve also seen explosive growth in services and products available online. Today, almost any activity - from personal banking to shopping and social networking - can be carried out over the internet. As such, it has become a treasure trove of money and information that cybercriminals can exploit for their personal gain.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd