The international cyber-security versus cyber-crime battle is gathering pace and what we’re seeing is the formation of international alliances to fight this rising scourge. However, the online world is unlike any other, it will take more than a defensive mindset to win this battle.
Mark Gregory |
26 Mar |
Read more
Over the last few years the topic of cyber security has gone mainstream. It’s now being actively discussed in boardrooms. The years 2012-2014 will go down in history as a period when many major corporations were breached, with the Sony Pictures hack becoming a landmark moment—nation-state actors got involved and executive orders authorising political sanctions were issued.
Puneet Kukreja |
26 Mar |
Read more
With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.
Joy Mali |
20 Mar |
Read more
The 2014 Asia-Pacific Spatial Excellence Awards (APSEA) have recognised some of the most innovative new products and technologies in the market, with augmented reality application Augview taking out the Innovation and Commercialisation Award.
Augview |
12 Mar |
Read more
The recent article by Cristian Florian, Most vulnerable operating systems and applications in 2014', was a huge hit, generating hundreds of comments and often heated debates and criticism. His analysis was also picked up by leading tech publications, generating even more chatter. What stood out is that IT professionals are really passionate about their favourite platform. This is a huge positive in the IT world as it helps a platform evolve beyond the efforts of its official maintainers and the results benefit everyone.
Emmanuel Carabott |
09 Mar |
Read more
Major web browsers and many web sites rely on the Secure Sockets Layer (SSL) protocol, which encrypts confidential information, such as credit card numbers, before sending them securely over the internet. SSL encryption ensures that email, e-commerce, voice-over-IP, online banking, remote health and countless other services are kept secure.
Ananda Rajagopal |
03 Mar |
Read more
We live in an application world. From shopping to communicating with friends, reading the news, following our favourite sports teams to listening to music – we do it through apps. With so many interactions and transactions now taking place via apps, maintaining security is becoming a big concern.
Matt Miller |
20 Feb |
Read more
There is no shortage of conversation around enterprise security. In light of some recent, high-profile hacking incidents, everyone’s talking about the importance of securing networks, data and devices in avoiding a worst case scenario of confidential customer or organisational information or IP being compromised. Interestingly, these conversations often neglect one vital component- the applications that operate on these systems and how their own vulnerabilities can bring down an organisations’ entire security strategy.
Mav Turner |
20 Feb |
Read more
With security breaches set to become more commonplace, enterprise IT teams have to be more vigilant and find new ways of combating these attacks. Cyberattacks on Australian companies, such as the recent hacking on major travel insurance company Aussie Travel Cover, have left many organisations feeling vulnerable.
Travis Greene |
18 Feb |
Read more
Today’s security landscape is constantly changing. Attackers are becoming more sophisticated and nimble, leading to new threats and attacks evolving every day. Tailor-made, stealthy threats now routinely evade traditional, point-in-time security defences by using multiple attack vectors. Further, advanced attacks use whatever unprotected paths exist - often blending paths - to compromise targets. Cyber criminals continue to go to great lengths to remain undetected, using technologies and methods that result in nearly imperceptible Indications of Compromise (IoCs). At the same time, the attack surface is increasing because modern networks are evolving, extending beyond traditional walls to include public and private data centres, endpoints, virtual machines, mobile devices, and the cloud.
Anthony Stitt |
18 Feb |
Read more
As organizations try to rein in technology budgets, IT staff members are constantly tasked with doing more and providing better services, all the while keeping costs and staff to a minimum. Couple this with increased usage of applications in the cloud, and the security issues entailed therein and you have a perfect combination for delays and disgruntled users.
Dean Wiech |
16 Feb |
Read more
2015 is likely to be ‘as bad or worse’ for large-scale data breaches than 2014, when a series of incidents at large companies exposed the sensitive information of millions of people and businesses, according to a new report.
Thu Pham |
10 Feb |
Read more
Every business holds at least some sensitive data. This may be sensitive personal information belonging to clients or employees, or confidential data relating to business operations. Keeping this secret information secret should be a concern to every business, no matter what industry or size.
James Billingsley |
30 Jan |
Read more
Mobile technology has redefined the way businesses operate, unleashing unprecedented levels of flexibility, collaboration and communication.
David Balazsy |
13 Jan |
Read more
Cybersecurity chiefs aren’t the only ones worrying about hackers these days. Anyone who uses a credit card or stores family photos in the cloud has nagging concerns about data security. Small business owners are worried, too.
Paul Lipman |
12 Jan |
Read more
The cyber-attack on Sony Pictures Entertainment in late November is not the first time that the Sony Corporation has been a target for cyber-criminals and if anything can be learned from the attacks, it is that corporations are not taking cyber-security seriously.
Mark Gregory, RMIT |
12 Jan |
Read more
In 2014, large retailers, franchises and small businesses alike were affected by new vulnerabilities and malware targeting point-of-sale (POS) devices, systems and vendors. One recent vulnerability affecting POS devices and systems was detailed by the US-CERT in its Vulnerability Notes Database.
Thu Pham |
09 Jan |
Read more
“There is no clouding the fact that security threats are increasing. Hackers are becoming more advanced in their techniques and with more devices being connected than ever before, it is becoming easier to spread malicious software. The situation is only going to get worse, as companies run from fire to fire, securing whatever is most important right now.”
Ian Hodge |
19 Dec |
Read more
With over one billion Android devices activated, the platform’s popularity has inevitably caught the attention of malware creators. The opportunity to target such a huge audience and get more bang for the buck is not easily dismissed nor will it be any time soon.
Emmanuel Carabott |
16 Dec |
Read more
Over the centuries, humans have built walls to keep intruders at bay. The Romans and Chinese were particularly adept at constructing extensive barricades: the Romans built Hadrian’s Wall in northern England and the Antonine Wall across what is now the Central Belt of Scotland, while the Chinese first started construction of would become the Great Wall of China in the 7th century BC.
Puneet Kukreja |
11 Dec |
Read more