Security

Trojan targets major Australian bank apps

10 March, 2016 by Dylan Bushell-Embling

ESET Australia has discovered an insidious new mobile banking Trojan targeting major banks from Australia, NZ and Turkey that is capable of bypassing some two-factor authentication.


Dell Data Protection Rapid Recovery

10 March, 2016 | Supplied by: Dell Technologies

The Dell Data Protection Rapid Recovery helps organisations better protect business-critical systems, applications and data — either on premises or in the cloud.


Porn clicker malware could be hiding in your apps

09 March, 2016 by Dylan Bushell-Embling

Security researchers at Bitdefender have identified nine unsuspecting apps on the Google Play store containing hidden 'porn clicker' malware.


ASX, Chi-X pass ASIC cyber resilience assessment

09 March, 2016 by Dylan Bushell-Embling

ASIC has published a report evaluating the cyber resilience of the ASX and Chi-X exchanges, as well as the good practices being implemented by other financial sector organisations.


Cybersecurity professionals lax with their own security

09 March, 2016 | Supplied by: Centrify Asia Pacific

An on-site survey at a recent cybersecurity conference in the US shows many IT professionals are lax with their own security when it comes to wearable technology.


Ixia Vision ONE Turnkey device

09 March, 2016 | Supplied by: IXIA

Ixia has launched Vision ONE, a turnkey device designed to rapidly collect, process and filter data and application flow to security and monitoring analytics.


Point-of-sale vulnerabilities are not going away

02 March, 2016 by Christopher Strand, PCIP, Senior Director of Compliance and Governance, Carbon Black

With point-of-sale attacks continuing, PoS and payment providers will need to build allegiances and share information more than ever in 2016.


Only 1 in 7 security chiefs report to the CEO

02 March, 2016 by Dylan Bushell-Embling

While the wide majority of company boards are concerned about cybersecurity, just 14% of security chiefs report directly to the CEO and 7% to the company board, research shows.


Researchers find critical flaw in Microsoft's EMET toolkit

25 February, 2016 by Dylan Bushell-Embling

Microsoft has had to patch its Enhanced Mitigation Experience Toolkit, designed to make user-mode programs more secure, after FireEye researchers found a simple method to disable it completely.


Linux distros infected with backdoors; McAfee offers to hack iPhone; Telco complaints at 9-year low

25 February, 2016 by Andrew Collins

Linux Mint website hacked and downloadable distros infected, John McAfee has offered to crack the San Bernardino iPhone, and telco complaints at lowest level since July 2006.


Australia third most targeted by banking botnets

23 February, 2016 by Dylan Bushell-Embling

Australia was the country third most targeted by banking botnets in 2015, with criminals attacking more than 95 financial institutions, Dell research shows.


Cybercrime got more sophisticated in 2015

23 February, 2016 by Dylan Bushell-Embling

Cybercrime exploit kits became more adept at avoiding detection by security systems in 2015, while perpetrators increasingly took to using encryption for the same purposes, research shows.


Researchers uncover weaknesses in email security

22 February, 2016 by Dylan Bushell-Embling

A study of traffic across the internet conducted by researchers from Australia, Germany and the US has provided evidence for the first time of the vulnerability of email traffic.


Australian IT leaders take email threats seriously

19 February, 2016 by Dylan Bushell-Embling

Recent surveys show that Australian security professionals take email threats more seriously than their peers in other markets, but C-suite executives need to be more involved in security planning.


Site blocking ineffective at stopping piracy: IA

18 February, 2016 by Dylan Bushell-Embling

After Village Roadshow filed legal action seeking to have an alleged piracy site blocked under new site blocking rules, IA has argued that this and other government approaches to stopping piracy are ineffective.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd