Destroying data to protect against fraud
Destroying data to protect against fraud.
Neerav Bhatt | 18 Oct | Read more
Destroying data to protect against fraud.
Neerav Bhatt | 18 Oct | Read more
With Facebook's constant stream of changes, keeping up with your privacy settings can be daunting. Here's a rundown of the newest features, what the changes mean to your privacy and how to update your settings.
Kristin Burnham | 07 Oct | Read more
It seems like there's a new data breach every day. And, the experts say, it's only going to get worse as hackers come up with new ways of getting their hands on our personal information. Here's a look at how malware is expected to evolve.
Jeff Vance | 05 Oct | Read more
The complexity of encryption schemes has been increased dramatically in an attempt to outpace the development of computational tools designed to crack them. Now it's important to devise algorithms that can't be brute forced for trillions of years in the hopes that they will remain secure long enough to be useful before they, too, are broken. Here's a quiz about encryption to see how well you are versed in one of security's most important components. Keep track of your score and check at the end to see how well you stack up.
Tim Greene and Jim Duffy | 29 Sep | Read more
Symantec Vision 2011 Sydney in pictures
Neerav Bhatt | 13 Sep | Read more
Our round-up of newly released security products in Australia
Abigail Swabey | 11 Sep | Read more
At CSO we are fascinated by the influence of pop-culture on cybercrime and security so we have put together a selection of the most influential security novels.
Abigail Swabey | 31 Aug | Read more
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy and data.
Eric Geier | 29 Aug | Read more
The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.
Neerav Bhatt | 25 Aug | Read more
Ponemon Institute asked 745 information-technology and security managers whether USB drives were important for business use, and if they were secure. What did the survey find?
Ellen Messmer | 24 Aug | Read more
Hack week in Vegas During the Black Hat and Defcon conferences in Las Vegas last week, researchers wheeled out their best new attacks on everything from browsers to automobiles, demonstrating ingenuity and diligence in circumventing security efforts or in some cases in exploiting systems that were built without security in mind. Here's a handful of the ones that deserve the most concern.
Tim Greene | 18 Aug | Read more
You just got your hands on a Google+ invite, but what next? Check out these ideas to get started using Google's new social network.
Kristin Burnham | 27 Jul | Read more
Fresh from their latest hack, Computerworld Australia brings you a timeline of LulzSec's major scalps
Diana Nguyen | 19 Jul | Read more
The curtain has fallen on the 50 day performance by hacker group LulzSec. Its campaign of mayhem and destruction, peppered with witty commentary captivated the world. In an alternate universe where Lulzcats reign and anti-security is the norm, it might have even earned a spot on its first target, The X-Factor. But on this earth its members may still be captured by its later targets: the CIA, US law enforcement and the FBI.
2011 so far has been filled with news of high-profile hacking - the Epsilon data breach, Microsoft and the various attempts of the nefarious Anonymous. Even the Australian Government copped a little unwanted interest. With this in mind, we thought it was time to track down the top ten Hollywood movies about hacking.
Computerworld Staff | 18 Apr | Read more