Security

Ransomware threats spread to APAC

29 August, 2016 by Dylan Bushell-Embling

The major ransomware operators have expanded into APAC, developing localised versions of their tools to help better extort payments from the region's internet users.


Apple patches iOS flaws used in cyber espionage

26 August, 2016 by Dylan Bushell-Embling

Apple has issued a patch to address three critical iOS vulnerabilities used in malware developed for purposes including spying on political dissidents, as reports circulate of iPhone 6 devices facing 'touch disease'.


OAIC compels Ashley Madison to improve privacy

26 August, 2016 by Dylan Bushell-Embling

The owners of the Ashley Madison dating site have made enforceable undertakings to take steps to better protect its customers' private information, following an OAIC probe into last year's data breach.


Mimecast expanding investment in Australia

25 August, 2016 by Dylan Bushell-Embling

Data and email security company Mimecast is investing in improving Australian cyber resilience after experiencing strong growth in the market.


Cybercrooks exploiting insiders in telco company attacks

25 August, 2016 by Dylan Bushell-Embling

Cybercriminals are recruiting rogue insiders or seeking to blackmail employees to help them carry out attacks against fixed and mobile telecom service providers, research from Kaspersky Lab shows.


No More Ransom disrupts WildFire ransomware

25 August, 2016 by Dylan Bushell-Embling

The collaboration between Kaspersky Lab, Intel Security and Dutch and European police to combat ransomware has scored a victory against the WildFire strain.


Accenture buys Australian security firm Redcore

24 August, 2016 by Dylan Bushell-Embling

Accenture has agreed to buy Melbourne-based Redcore to expand Accenture Security's capabilities in IAM and security-as-a-service.


Three keys to securing our cybersecurity future

22 August, 2016 by Garry Barnes, Practice Lead, Governance Advisory, Vital Interacts (Australia), and ISACA spokesperson | Supplied by: Information Systems Audit and Control Association

Now that the election is over, it's time for the federal government to get back to business and implement its Cybersecurity Strategy.


Passwords are broken: Centrify executive

22 August, 2016 by Dylan Bushell-Embling

Visiting Centrify executive David McNeely believes it is time to address the fact that passwords are the weak link in security, responsible for the majority of data breaches.


40% of Aussie orgs not prepared for insider threats

19 August, 2016 by Dylan Bushell-Embling

The disproportionate focus on perimeter defence in IT security has left many Australian organisations unprepared to deal with malicious insider threats.


OAIC examines Census attack; Oracle MICROS breach; Linux TCP weakness

18 August, 2016 by Andrew Collins

Privacy Commissioner satisfied no Census data was stolen, Russian criminals breach hundreds of Oracle systems, and dangerous Linux security weakness found.


Ixia iBypass VHD bypass switch

17 August, 2016 | Supplied by: Keysight Network Solutions

Ixia has released iBypass VHD, a modular, high-density, inline bypass switch.


Security summit for Sydney in September

15 August, 2016 by Dylan Bushell-Embling

Palo Alto Networks' first Australian cybersecurity summit will bring together a number of local and international experts to discuss how organisations should shape their security strategies.


Attackers scraping data from LinkedIn

15 August, 2016 by Dylan Bushell-Embling

LinkedIn has filed a lawsuit seeking to identify and obtain an injunction against unknown attackers who have been illegally scraping data from the enterprise social media platform since December.


'Strider' targets Europe, Asia; Telstra's 5G tests; ACCC to study comms market

11 August, 2016 by Andrew Collins

Symantec says many targets have been attacked with 'Strider' malware, ACCC to scrutinise competition in the comms market, and Telstra to test Ericsson's 5G technology.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd