Google’s G Suite gets new dashboard to spot new threats
Google offers a G Suite customers a central place to manage and monitor security threats and adjust security settings.
Google offers a G Suite customers a central place to manage and monitor security threats and adjust security settings.
OnePlus investigates a possible card breach after customers report fraudulent charges on cards used to recently purchase OnePlus phones online.
A WebLogic exploit is proving popular with criminals who free ride off company servers to mine the cryptocurrency Monero.
Microsoft turns up the heat on misbehaving antivirus in the wake of Meltdown and Spectre.
If the world’s IT community wasn’t already nursing headaches from their New Year’s celebrations – and the anticipation of a year in which cybercriminals are set to get even smarter about their attacks – things got worse quickly with the announcement of two security flaws that stem from issues in the hardware of Intel and other microprocessors built into billions of computers and mobile devices.
David Braue | 09 Jan | Read more
This was the year that cybersecurity hit the mainstream – and cybercriminals showed the world they’re not kidding around.
David Braue | 31 Dec | Read more
The law catches up with affiliates in one of the biggest ransomware-as-a-service operation, but the ransomware's developer remains at large.
Are you prepared for a security breach?
David Braue | 18 Dec | Read more
For an organisation whose entire business revolves around the trafficking of healthcare data, the need for information security is hardy a revelation.
David Braue | 06 Dec | Read more
The UK steps up threat intelligence and support after WannaCry revealed weaknesses in healthcare.
Security analysts have long spruiked the benefits of automation, artificial intelligence (AI) and machine learning (ML) – but with Australia racing towards security automation at world-beating pace, one security expert has warned potential adopters to maintain healthy scepticism and a commitment to continuous process improvement.
David Braue | 09 Nov | Read more
Revelations that 30GB of sensitive Australian military data were exfiltrated from a subcontractor have underscored the risk faced by Australian companies that continue to leave themselves exposed by failing to employ “established and relatively straightforward cyber security measures”, the federal government’s peak cybersecurity body has warned as new data points confirms that local businesses are seeing increasing losses to cyber-attackers.
David Braue | 06 Nov | Read more
Study of phishing kit ecosystem phishers feeding off each other.
Contextualise education campaigns to convince employees why they should care
David Braue | 31 Oct | Read more
Victoria Police has raised the bar on password security for Australian consumers to dizzying heights, marking Stay Safe Online Week with an exhortation for users to use passwords with at least 16 characters in them and to rely on 2-factor authentication for bank accounts, social media, and online payments.
David Braue | 12 Oct | Read more
UK breach nearly twice as big than first thought.
Small and medium businesses are struggling to keep up with their need for security specialists.
David Braue | 09 Oct | Read more
This interactive session will bring you and your peers up to date on the latest in credential management, and its role in containing security risks that you may not even know about.
Manufacturers of medical devices and other Internet of Things (IoT) tools are increasingly seeking help to review and secure their source code, according to an Australian security consultancy that will soon hold a formal ‘hack day’ in which its researchers will each try to compromise a different IoT device.
David Braue | 28 Sep | Read more
Penetration testing often uncovers the same vulnerabilities over and over again while leaving other avenues of compromise wide open, a ‘red-team’ hacker has warned while reporting that his firm is still seeing “great success” using malware techniques and social engineering to compromise “complacent” firms that would seem to be following security best practices on paper.
David Braue | 20 Sep | Read more