Thwarting a new breed of cyberattack
13 July, 2015 by Shane Bellos, General Manager, Enterprise Security Products, HP Software, HP South Pacific | Supplied by: Hewlett Packard EnterpriseCybercrime can lead to financial loss, reputational damage and physical harm. The ICT industry needs to tackle the problem head-on, through real-time monitoring and information sharing.
Attackers weaponising Hacking Team Flash exploit
10 July, 2015 by Dylan Bushell-Embling | Supplied by: Trend Micro Australia Pty LtdPopular exploit kits are already being updated to include the zero-day Flash exploit discovered in a trove of leaked data from Hacking Team in Italy, Trend Micro researchers have discovered.
Massive security leaks as spy company hacked; NSW privacy law inquiry; AISA appoints CEO
09 July, 2015 by Andrew CollinsSpy company gets hacked with sensitive data leaked, public asked to comment on online privacy invasions like revenge porn and AISA board appoints its first CEO.
3D fingerprint sensor may improve smartphone security
09 July, 2015 by Dylan Bushell-EmblingA prototype developed by the University of California could pave the way for far more robust fingerprint biometric technology, helping to keep smartphones and other devices more secure.
Android ransomare makes up 25% of Aussie malware
07 July, 2015 by Dylan Bushell-EmblingAndroid ransomware accounted for 25% of all malware detected in Australia during the month of May, a steep rise from 6% in February, research shows.
Australian SMBs at risk due to poor data security
01 July, 2015 by Dylan Bushell-EmblingAustralian SMBs are lagging behind large companies in terms of understanding and implementing data security policies involving disposing of confidential information.
Cisco patches virtual appliances after SSH error
29 June, 2015 by Dylan Bushell-EmblingCisco has released patches for three virtual appliances released with identical default encryption keys and has predicted that Australian IP traffic will hit 1.4 Exabytes per month in 2019.
Microsoft still earning millions from Win XP support
25 June, 2015 by Dylan Bushell-EmblingThe US Navy has agreed to pay Microsoft US$9m to continue supporting its Windows XP installations, while HP's ZDI has published details of an exploit in IE that could allow attackers to bypass Windows' ASLR security feature.
On the attack: setting up your own cyberlab
24 June, 2015 by Ian Trump, Security Lead, LogicNow | Supplied by: LogicNowThe ability to test back-up and disaster-recovery plans, new or updated applications and new hardware becomes very easy with a small investment in a virtual lab.
Aussie CIOs making security their top priority
24 June, 2015 by Dylan Bushell-EmblingFor the first time, Australian CIOs are making security their top priority across all of IDC's Third Platform technologies — big data, cloud, mobility and social, the research firm said.
Kaspersky wins major Aust Govt deal
17 June, 2015 by Dylan Bushell-EmblingKaspersky Lab to provide security for 2500 employees of the Department of Prime Minister and Cabinet, as Kaspersky's founder warns of the overall threat of deadly cyber attacks.
Cybersecurity pros admit to poor security maturity
15 June, 2015 by Dylan Bushell-EmblingSecurity professionals worldwide consistently report insufficient cybersecurity maturity, particularly in the areas of risk assessment and mitigation.
iiNet investigating alleged Westnet breach
11 June, 2015 by Dylan Bushell-Embling | Supplied by: iiNet LimitedISP iiNet is investigating claims that a hacker has stolen and put up for sale a legacy customer database from subsidiary Westnet, while a new report highlights the growing ransomware threat.
What can we learn from the Snowden case?
08 June, 2015 by Daren Glenister, Field Chief Technology Officer, Intralinks | Supplied by: IntraLinksThe security perimeter has shifted from firewalls to identity management and now to content management, with the aim of preventing another Edward Snowden from succeeding.
As malware threats loom, end users are the weak link
21 May, 2015 by Dylan Bushell-EmblingThe ACCC has warned Australian businesses of an influx of malware and ransomware threats, while research has shown that corporate devices are most vulnerable when away from the security perimeter.