Malware / Cybercrime — Opinions

​Security in 2020 – Data Security is Key

Gone are the days when data was confined to the data centre and we could put a virtual fence around it and protect it. Now data is everyone with multiple copies of it. This causes a massive headache for CISOs who are tasked with protecting this data from falling into the wrong hands. The question then arises, with data literally everywhere, how do we achieve this?

Ashwin Pal | 02 Aug | Read more

Cyberwar Incident Response at the Speed of Thought

In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.

Nick Race | 12 Apr | Read more

Do you have an Insider Threat Program?

Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.

David Gee | 01 Apr | Read more

Preventing phishing attacks

Phishing attacks have been there since the time authentication methods have been in place. An attack where the attacker tricks the victim into submitting their authentication credentials is termed as phishing attacks. With advancement of technology, the attacks also have been advancing, causing significant damage to the victims at times.

Shantanu Bhattacharya | 31 Mar | Read more

Dyre Straights: How to Best Combat the Latest Generation of Malware

The information security professional’s worst nightmare is the cybercriminal attack imposter armed with a legitimate user’s valid credentials. Unfortunately, the cybercriminals are adept at stealing them. Valid usernames and passwords can be lost in data breaches, keystroke loggers may capture them and ship them off, an end user can be socially engineered to reveal them – the list is long. These examples, however, are only bad dreams compared the latest generation of malware variants called Dyre or Dyreza – a Remote Access Trojan, or RAT.

Oren Kedem and Michael Toth | 09 Jul | Read more

Why cybersecurity matters

Last year saw some of the highest profile data breaches involving huge multinational organisations and government agencies. In fact, the Australian Government has reported that it can document at least one attack against its IT systems by a foreign power. Whether in the government, entertainment or retail sector, these organisations were forced to answer some tough questions by their stakeholders.

David Kim | 06 Jul | Read more

The true cost of a data breach

There are many reasons for security attacks. Attackers may be looking for payment card data or other sensitive commercial information, or they may simply wish to disrupt an organisation’s operations. Whatever their motive, data breaches have a significant impact on a business. Protecting an organisation from an unwanted intrusion can save tens of millions of dollars, and help maintain customer loyalty and shareholder confidence. But can we really quantify the true cost of a data breach?

Robert Parker | 07 Jul | Read more

A move towards cyber resilience in a world without borders

Late last year, the Australian Securities and Investments Commission chairperson, Greg Medcraft called for Australia to focus on "cyber resilience" to prevent destabilisation of financial markets. Coincidentally, a day later, the Australian Government announced the formation of a cyber security expert panel to review the nation’s cyber security efforts. This came in the wake of the Australian Signals Directorate reporting a 37 per cent increase in cyber security incidents on the previous year.

John Ellis | 15 Jun | Read more