The Australian Academy of Technology and Engineering has urged the government to focus on cyber resilience while developing its 2020 Cyber Security Strategy.
A new report from BlackBerry's Cylance found that several governments have been exploiting the mobile threat landscape for at least a decade.
Privacy complaints to the Office of the Australian Information Commissioner grew to 3306 during the last financial year.
Logistics and e-commerce technology company Pitney Bowes is working to restore services after a ransomware attack took some of its systems out of commission.
The board of UK-based security company Sophos will unanimously recommend a US$3.82bn takeover offer from US private equity company Thoma Bravo.
Researchers have released the "largest publicly available data set" of malicious activity to help businesses hone their cybersecurity capabilities.
Canberra-based Penten and the CSIRO's Data61 will collaborate to support research and development on cyber decoy and cyber trap capabilities.
The ANU has published a forensic investigation into what VC Brian Schmidt has called a "shockingly sophisticated" targeted cyber attack on its systems.
Security company Proofpoint has provided details of a staged malware downloader they are calling WhiteShadow that exploits Office macros and SQL commands.
Australia fronted just over 3% of the world's phishing attacks last quarter, putting it at number seven in the top phishing hosting countries, RSA said.
Victoria will not allow the federal government and other states to access data it uploads to the National Driver Licence Facial Recognition Solution.
Facebook has confirmed reports that a public server containing hundreds of millions of user phone numbers has been discovered online.
Trend Micro's Midyear Security Roundup for the first half of the year identifies trends including the growing use of fileless malware designed to avoid detection.
Almost half of Australians are concerned over the security and privacy of their digital health records, according to a new report.
The ASD has published a list of the devices that have been evaluated under its ASD Cryptographic Evaluation and High Assurance evaluation programs.