50 ‘hacktivist’ amateur DDoS tools analysed

08 February, 2012

Network security vendor Arbor Networks has published a visual review of DDoS tools that are used by hacktivist’ collectives - groups that hack into computers and organisations as a form of political protest.

Two-thirds of web apps at risk of hacking

03 February, 2012

Two-thirds of web applications tested by security consultants at Context Information Security in 2011 were found to be at risk from cross-site scripting, the consultancy firm announced today. On top of that, nearly one in five web applications risked attacks by experienced SQL injections.

Cyber criminals are targeting mobile devices, warns latest AVG report

27 January, 2012

Internet and mobile security software distributor AVG has released it's latest Community Powered Threat Report which provides insight, background and analysis on the trends and developments in cybercrime over the previous 3 months. The Q4 2011 report includes the risks of QR codes, stolen digital certificates bypassing security on mobile phones and the persistence of rootkits.

Free internet security suite for Westpac customers

19 January, 2012

Customers of Westpac, St George, Bank SA and Bank of Melbourne now have access to a one-year free subscription to Bitdefender’s Internet Security 2012, thanks to a partnership between the Westpac Group and the information security company.

Check Point cloud-based software blades

17 January, 2012

Check Point Software Technologies’ security gateways are available through Amazon Web Services. Organisations can apply the same level of security and control to their public cloud network as they have to their traditional networks, extending their security to the cloud with over 30 software blade protections, including firewall, IPS, virtual private network (VPN), application control, URL filtering, mobile access and data loss prevention (DLP).

Grace Christian School deploys web filtering solution

19 December, 2011

Grace Christian School has deployed a web filtering and anonymous proxy prevention solution, providing its students and staff with a safer and more secure IT environment.

Endian Mini Unified Threat Management (UTM) system

19 December, 2011

The Mini Unified Threat Management (UTM) system is a network security solution that delivers a suite of advanced features such as a firewall, web content filtering, email filtering, intrusion prevention, voice over IP support, Wi-Fi hotspot, gateway antivirus, antispam and antispyware.

SafeNet Sentinel HASP HL MaxMicro licensing key

16 December, 2011

The Sentinel HASP HL MaxMicro licensing dongle is now available. With a 15.6 x 19.1 mm footprint, a quarter of the size of the traditional Sentinel HASP key, it offers the same level of protection of intellectual property (from piracy, theft or reverse engineering) and enforcement of licensing models (including perpetual, feature-based, pay-per-use, time-based and custom).

Largest DDoS in 2011 hits Asian organisation

24 November, 2011

The largest distributed denial of service (DDoS) attack of 2011 took place two weeks ago, according to Prolexic Technologies, a company that offers DDoS protection services.

Expect more severe DDoS attacks this holiday season

01 November, 2011

Distributed denial of service (DDoS) attacks are likely to last longer than usual during the upcoming holiday season, particularly against companies with e-commerce presences.

Imperva SecureSphere data security for Microsoft SharePoint

31 October, 2011

SecureSphere for SharePoint is a data security solution to protect sensitive data stored in Microsoft SharePoint.

Check Point Software Technologies Anti-Bot Software Blade

28 October, 2011

Check Point Software Technologies has announced a new Anti-Bot Software Blade that protects against bots and APTs (advance persistent threats) and delivers high traffic performance of up to 40 Gbps.

Expect chaos and catastrophes in security landscape

14 October, 2011 by Merri Mack

IT departments are being urged to make use of new technologies like social media, mobility, virtualisation and the cloud. Each of these carries new security risks and IT departments must learn new tactics to successfully secure them, as Merri Mack explains.

With great cloud comes great responsibility

07 October, 2011

Cloud computing is often treated as something of a black box: you put data into it, some magic goes on, and processed data comes out. But even though someone else is taking care of the heavy lifting, securing your data as it goes into the cloud is still your responsibility. So says Vince Lee, Regional Manager, Australia & New Zealand, SafeNet.

WatchGuard SCADA protection

27 September, 2011

Firewalls and UTMs with Application Control from WatchGuard now include protective supervisory control and data acquisition (SCADA) signatures.

  • All content Copyright © 2022 Westwick-Farrow Pty Ltd