Inside job: Trend Micro employee sold customer details to tech support scammers
If you use Trend Micro consumer anti-virus and you've been getting scam tech support calls, now you know why.
If you use Trend Micro consumer anti-virus and you've been getting scam tech support calls, now you know why.
Google brings site isolation to Chrome on Android and improves the defense for Chrome on the desktop.
Attackers claim to be wiping devices and asking for a ransom from Iomega NAS users.
If you have the right information, a cracked windshield on a Tesla can be worth five times its cost of replacement.
The employment market is hungry for “future focused” executives with the ability to manage cybersecurity risk at the board level, according to a recent jobs market update that also found employers put a premium on executives who understand the need to continually test systems through regular red-teaming and penetration testing.
David Braue | 29 May | Read more
Online scammers took $US2.7b ($A3.7b) from their victims last year, according to new FBI figures that found business email compromise (BEC) attacks accounted for more than half of all losses.
David Braue | 30 Apr | Read more
It's common for businesses to pay ransomware attackers and may would do it again.
Admins managing Cisco's RV320 and RV325 routers should definitely install new firmware available today.
G Suite admins demand a way to prevent staff from using SMS codes to sign into Google accounts.
The cost of data breaches to Australian companies has surged over the past year to be well above global averages, according to new research in which 47 percent of Australian CISOs said breaches had costed them more than US$5m (A$7m).
David Braue | 08 Mar | Read more
Phishing threats aren't disappearing any time soon, warns Microsoft.
Threat intelligence has become a nice-to-have for many vendors seeking to improve their security offerings, but for the executives leading Cisco’s Security Business Group it’s just the framework for a product-development process that is focused on maintaining a consistent, end-to-end network security architecture while supporting all manner of front-facing customer innovation.
David Braue | 06 Mar | Read more
Organisations are leaving themselves exposed by failing to demand adequate security protections when buying new technology, according to a senior Cisco executive who warned that security and networking specialists must work together better to close persistent gaps.
David Braue | 05 Mar | Read more
Businesses wanting to improve their security practice need to reconsider the way they position cybersecurity within their business philosophy, a security analyst has told an audience of security practitioners while warning that the persistence of “terrifying” images of cybersecurity practitioners had challenged the progression of cybersecurity into becoming a mainstream business concern.
David Braue | 05 Mar | Read more
Asia-Pacific companies are struggling more than their global peers to get their heads around cyber fatigue, John Maynard, vice president for global security sales with Cisco, has warned in kicking off the Cybersecurity Innovation Day at this week’s Cisco Live! conference.
David Braue | 05 Mar | Read more
The annual RSA security conference draws the industry together from around the world, with hot startups rubbing shoulders with the biggest cybersecurity giants as they position their products and strategies for the coming year.
David Braue | 05 Mar | Read more
The week in security: Cybercriminals celebrate NDB’s first anniversary with... more breaches
David Braue | 25 Feb | Read more
While spending on cybersecurity expertise would seem to be a no-brainer, the large number of companies without formal inhouse expertise suggests another ongoing, underlying challenge in finding and securing those skills within the current competitive market.
By CSO staff | 22 Feb | Read more
Conventional views of credential compromise may focus on external activities such as mass credential-stuffing attacks and password-stealing malware, but new breach-compromise statistics suggest that the fast-paced adoption of cloud and associated DevOps techniques has created other vulnerabilities that CISOs still don’t fully appreciate.
David Braue | 08 Feb | Read more
Your PC or phone soon might not work when connecting to a non-compliant USB Type-C charger.