Pick your battles: cybercriminals are outspending you 11 to 1
Darkweb sales have “all but faded” as exploit brokerages take over, Tenable finds as economic analysis maps the vulnerability-to-exploit ecosystem
David Braue | 10 Dec | Read more
Darkweb sales have “all but faded” as exploit brokerages take over, Tenable finds as economic analysis maps the vulnerability-to-exploit ecosystem
David Braue | 10 Dec | Read more
Reports suggested that China had become the biggest source of Black Friday weekend fraud, even as the Australian Federal Police led a multinational effort to take down a spyware tool that had thousands of paying customers.
David Braue | 09 Dec | Read more
A quarter of Black Friday purchases suspected to be fraudulent – and China blamed for 57 percent of them
David Braue | 09 Dec | Read more
Labor attacks “broken promises” around encryption laws but Melbourne developers report no concerns from overseas customers
David Braue | 06 Dec | Read more
A recent study showed that more than three in four organizations treat API security differently than web app security, indicating API security readiness lags behind other aspects of application security.
Sekhar Sarukkai, McAfee | 05 Dec | Read more
Quantum decryption means the data you encrypt today will be compromised within a decade.
It's the centenary of the commencement of World War One. Back then, there were borders to protect. The soldiers knew who they were fighting and there were very few incursions where one side crossed a border undetected. Today's battles are different. The bad guys are stealing the good guys’ passwords and identities to get access to whatever they want. And they often wait weeks or even months before revealing their true objectives.
Abigail Swabey | 22 Oct | Read more
Destroying data to protect against fraud.
Neerav Bhatt | 18 Oct | Read more
The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.
Tim Greene and Jim Duffy | 29 Sep | Read more
Symantec Vision 2011 Sydney in pictures
Neerav Bhatt | 13 Sep | Read more
So, Identity Theft. What is it really? Well, I’m glad you asked. It’s basically when your personal details are used fraudulently to open accounts or obtain documentation in your name. This could result in debts being accumulated, for which you would initially be accountable – until you prove yourself innocent.
Bennett Arron | 11 Jul | Read more
Ensuring top-level enterprise security has never been more important for the financial services (FS) industry.
Monica Hovsepian, OpenText | 09 Dec | Read more
Modern terrorism and cyberwar are major threats to our society’s way of life.
Craig Ford | 30 Dec | Read more
I don't know about the rest of you, but I seem to spend a bit of time lately in rideshares like Uber, Didi, Ola or any of the other new entrants to the market.
Craig Ford | 17 Dec | Read more
Australia’s Communications Minister recently announced telecommunications companies will be required to adhere to tighter regulations around identity verification for those porting mobile numbers from one provider to another.
Simon Marchand | 03 Dec | Read more
I have some red team/pentest jobs coming up and I was trying to think of how I could get into an organisation with a bit of style while having some fun.
Craig Ford | 03 Dec | Read more