Security

Thwarting a new breed of cyberattack

13 July, 2015 by Shane Bellos, General Manager, Enterprise Security Products, HP Software, HP South Pacific | Supplied by: Hewlett Packard Enterprise

Cybercrime can lead to financial loss, reputational damage and physical harm. The ICT industry needs to tackle the problem head-on, through real-time monitoring and information sharing.


Attackers weaponising Hacking Team Flash exploit

10 July, 2015 by Dylan Bushell-Embling | Supplied by: Trend Micro Australia Pty Ltd

Popular exploit kits are already being updated to include the zero-day Flash exploit discovered in a trove of leaked data from Hacking Team in Italy, Trend Micro researchers have discovered.


Massive security leaks as spy company hacked; NSW privacy law inquiry; AISA appoints CEO

09 July, 2015 by Andrew Collins

Spy company gets hacked with sensitive data leaked, public asked to comment on online privacy invasions like revenge porn and AISA board appoints its first CEO.


3D fingerprint sensor may improve smartphone security

09 July, 2015 by Dylan Bushell-Embling

A prototype developed by the University of California could pave the way for far more robust fingerprint biometric technology, helping to keep smartphones and other devices more secure.


Android ransomare makes up 25% of Aussie malware

07 July, 2015 by Dylan Bushell-Embling

Android ransomware accounted for 25% of all malware detected in Australia during the month of May, a steep rise from 6% in February, research shows.


Australian SMBs at risk due to poor data security

01 July, 2015 by Dylan Bushell-Embling

Australian SMBs are lagging behind large companies in terms of understanding and implementing data security policies involving disposing of confidential information.


Cisco patches virtual appliances after SSH error

29 June, 2015 by Dylan Bushell-Embling

Cisco has released patches for three virtual appliances released with identical default encryption keys and has predicted that Australian IP traffic will hit 1.4 Exabytes per month in 2019.


Microsoft still earning millions from Win XP support

25 June, 2015 by Dylan Bushell-Embling

The US Navy has agreed to pay Microsoft US$9m to continue supporting its Windows XP installations, while HP's ZDI has published details of an exploit in IE that could allow attackers to bypass Windows' ASLR security feature.


On the attack: setting up your own cyberlab

24 June, 2015 by Ian Trump, Security Lead, LogicNow | Supplied by: LogicNow

The ability to test back-up and disaster-recovery plans, new or updated applications and new hardware becomes very easy with a small investment in a virtual lab.


Aussie CIOs making security their top priority

24 June, 2015 by Dylan Bushell-Embling

For the first time, Australian CIOs are making security their top priority across all of IDC's Third Platform technologies — big data, cloud, mobility and social, the research firm said.


Kaspersky wins major Aust Govt deal

17 June, 2015 by Dylan Bushell-Embling

Kaspersky Lab to provide security for 2500 employees of the Department of Prime Minister and Cabinet, as Kaspersky's founder warns of the overall threat of deadly cyber attacks.


Cybersecurity pros admit to poor security maturity

15 June, 2015 by Dylan Bushell-Embling

Security professionals worldwide consistently report insufficient cybersecurity maturity, particularly in the areas of risk assessment and mitigation.


iiNet investigating alleged Westnet breach

11 June, 2015 by Dylan Bushell-Embling | Supplied by: iiNet Limited

ISP iiNet is investigating claims that a hacker has stolen and put up for sale a legacy customer database from subsidiary Westnet, while a new report highlights the growing ransomware threat.


What can we learn from the Snowden case?

08 June, 2015 by Daren Glenister, Field Chief Technology Officer, Intralinks | Supplied by: IntraLinks

The security perimeter has shifted from firewalls to identity management and now to content management, with the aim of preventing another Edward Snowden from succeeding.


As malware threats loom, end users are the weak link

21 May, 2015 by Dylan Bushell-Embling

The ACCC has warned Australian businesses of an influx of malware and ransomware threats, while research has shown that corporate devices are most vulnerable when away from the security perimeter.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd