Security

Vulnerabilities found in half of top 50 PC applications

17 March, 2016 by Dylan Bushell-Embling

An annual study from Flexera's Secunia Research shows that 2048 vulnerabilities were found among 25 of the top 50 applications found on private PCs in 2015.


Australia a major target of Nemucod malware

14 March, 2016 by Dylan Bushell-Embling

Nemucod, a malicious file designed to install ransomware and other malware, disproportionately targets markets including Australia, Japan and parts of Europe.


Trojan targets major Australian bank apps

10 March, 2016 by Dylan Bushell-Embling

ESET Australia has discovered an insidious new mobile banking Trojan targeting major banks from Australia, NZ and Turkey that is capable of bypassing some two-factor authentication.


Dell Data Protection Rapid Recovery

10 March, 2016 | Supplied by: Dell Technologies

The Dell Data Protection Rapid Recovery helps organisations better protect business-critical systems, applications and data — either on premises or in the cloud.


Accenture Cyber Intelligence Platform

10 March, 2016 | Supplied by: Accenture

The Accenture Cyber Intelligence Platform combines managed security, artificial intelligence, cloud and analytic services for behavioural intelligence on demand, at speed and at scale.


Ixia Vision ONE Turnkey device

09 March, 2016 | Supplied by: IXIA

Ixia has launched Vision ONE, a turnkey device designed to rapidly collect, process and filter data and application flow to security and monitoring analytics.


ASX, Chi-X pass ASIC cyber resilience assessment

09 March, 2016 by Dylan Bushell-Embling

ASIC has published a report evaluating the cyber resilience of the ASX and Chi-X exchanges, as well as the good practices being implemented by other financial sector organisations.


Cybersecurity professionals lax with their own security

09 March, 2016 | Supplied by: Centrify Asia Pacific

An on-site survey at a recent cybersecurity conference in the US shows many IT professionals are lax with their own security when it comes to wearable technology.


Porn clicker malware could be hiding in your apps

09 March, 2016 by Dylan Bushell-Embling

Security researchers at Bitdefender have identified nine unsuspecting apps on the Google Play store containing hidden 'porn clicker' malware.


Only 1 in 7 security chiefs report to the CEO

02 March, 2016 by Dylan Bushell-Embling

While the wide majority of company boards are concerned about cybersecurity, just 14% of security chiefs report directly to the CEO and 7% to the company board, research shows.


Point-of-sale vulnerabilities are not going away

02 March, 2016 by Christopher Strand, PCIP, Senior Director of Compliance and Governance, Carbon Black

With point-of-sale attacks continuing, PoS and payment providers will need to build allegiances and share information more than ever in 2016.


Linux distros infected with backdoors; McAfee offers to hack iPhone; Telco complaints at 9-year low

25 February, 2016 by Andrew Collins

Linux Mint website hacked and downloadable distros infected, John McAfee has offered to crack the San Bernardino iPhone, and telco complaints at lowest level since July 2006.


Researchers find critical flaw in Microsoft's EMET toolkit

25 February, 2016 by Dylan Bushell-Embling

Microsoft has had to patch its Enhanced Mitigation Experience Toolkit, designed to make user-mode programs more secure, after FireEye researchers found a simple method to disable it completely.


Cybercrime got more sophisticated in 2015

23 February, 2016 by Dylan Bushell-Embling

Cybercrime exploit kits became more adept at avoiding detection by security systems in 2015, while perpetrators increasingly took to using encryption for the same purposes, research shows.


Australia third most targeted by banking botnets

23 February, 2016 by Dylan Bushell-Embling

Australia was the country third most targeted by banking botnets in 2015, with criminals attacking more than 95 financial institutions, Dell research shows.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd