Trojan targets major Australian bank apps
10 March, 2016 by Dylan Bushell-EmblingESET Australia has discovered an insidious new mobile banking Trojan targeting major banks from Australia, NZ and Turkey that is capable of bypassing some two-factor authentication.
Dell Data Protection Rapid Recovery
10 March, 2016 | Supplied by: Dell TechnologiesThe Dell Data Protection Rapid Recovery helps organisations better protect business-critical systems, applications and data — either on premises or in the cloud.
Porn clicker malware could be hiding in your apps
09 March, 2016 by Dylan Bushell-EmblingSecurity researchers at Bitdefender have identified nine unsuspecting apps on the Google Play store containing hidden 'porn clicker' malware.
ASX, Chi-X pass ASIC cyber resilience assessment
09 March, 2016 by Dylan Bushell-EmblingASIC has published a report evaluating the cyber resilience of the ASX and Chi-X exchanges, as well as the good practices being implemented by other financial sector organisations.
Cybersecurity professionals lax with their own security
09 March, 2016 | Supplied by: Centrify Asia PacificAn on-site survey at a recent cybersecurity conference in the US shows many IT professionals are lax with their own security when it comes to wearable technology.
Ixia Vision ONE Turnkey device
09 March, 2016 | Supplied by: IXIAIxia has launched Vision ONE, a turnkey device designed to rapidly collect, process and filter data and application flow to security and monitoring analytics.
Point-of-sale vulnerabilities are not going away
02 March, 2016 by Christopher Strand, PCIP, Senior Director of Compliance and Governance, Carbon BlackWith point-of-sale attacks continuing, PoS and payment providers will need to build allegiances and share information more than ever in 2016.
Only 1 in 7 security chiefs report to the CEO
02 March, 2016 by Dylan Bushell-EmblingWhile the wide majority of company boards are concerned about cybersecurity, just 14% of security chiefs report directly to the CEO and 7% to the company board, research shows.
Researchers find critical flaw in Microsoft's EMET toolkit
25 February, 2016 by Dylan Bushell-EmblingMicrosoft has had to patch its Enhanced Mitigation Experience Toolkit, designed to make user-mode programs more secure, after FireEye researchers found a simple method to disable it completely.
Linux distros infected with backdoors; McAfee offers to hack iPhone; Telco complaints at 9-year low
25 February, 2016 by Andrew CollinsLinux Mint website hacked and downloadable distros infected, John McAfee has offered to crack the San Bernardino iPhone, and telco complaints at lowest level since July 2006.
Australia third most targeted by banking botnets
23 February, 2016 by Dylan Bushell-EmblingAustralia was the country third most targeted by banking botnets in 2015, with criminals attacking more than 95 financial institutions, Dell research shows.
Cybercrime got more sophisticated in 2015
23 February, 2016 by Dylan Bushell-EmblingCybercrime exploit kits became more adept at avoiding detection by security systems in 2015, while perpetrators increasingly took to using encryption for the same purposes, research shows.
Researchers uncover weaknesses in email security
22 February, 2016 by Dylan Bushell-EmblingA study of traffic across the internet conducted by researchers from Australia, Germany and the US has provided evidence for the first time of the vulnerability of email traffic.
Australian IT leaders take email threats seriously
19 February, 2016 by Dylan Bushell-EmblingRecent surveys show that Australian security professionals take email threats more seriously than their peers in other markets, but C-suite executives need to be more involved in security planning.
Site blocking ineffective at stopping piracy: IA
18 February, 2016 by Dylan Bushell-EmblingAfter Village Roadshow filed legal action seeking to have an alleged piracy site blocked under new site blocking rules, IA has argued that this and other government approaches to stopping piracy are ineffective.