Chrome versus IE and Edge: which is more secure for enterprise?
Google releases two third-party white papers to show why Chrome is more secure than Internet Explorer 11 and Microsoft Edge in the enterprise.
Google releases two third-party white papers to show why Chrome is more secure than Internet Explorer 11 and Microsoft Edge in the enterprise.
A growing spate of share-price declines is showing a correlation between data breaches and real financial damage – something that will catch the attention of even the most cynical board members.
David Braue | 18 Sep | Read more
Good information-security personnel have become harder and harder to find – and that is making it harder to mount an effective defence against ballooning volumes of security alerts.
David Braue | 08 Sep | Read more
Phishers are targeting Office 365 users in what appears to be an attempt to soften a target for major financial fraud.
Ransomware that targets specific businesses and spreads itself using worm-like techniques were game changers this year as ransomware authors shifted focus to the business community in attacks that now cost an average ransom of $US544 ($A684) per endpoint, new research has warned.
David Braue | 02 Sep | Read more
Angelfire is the twenty second malware WikiLeaks has revealed since March.
It may have just signed onto a development partnership with a key US cybersecurity consortium, but Australian multi-factor authentication (MFA) contender TokenOne is still prioritising local capital investment as part of a strategy to keep its burgeoning business grounded firmly on our shores.
David Braue | 29 Aug | Read more
Researchers at Trend Micro and Cisco's Talos have identified a new wave of phishing attacks leveraging CVE-2017-0199, a previously patched remote code execution vulnerability in the OLE (Windows Object Linking and Embedding) interface of Microsoft Office.
Steve Ragan | 16 Aug | Read more
The accidental mass leakage of Swedish drivers’ personal details caused red faces amongst that country’s government, providing fodder for hackers that have become highly effective in dreaming up new ways to generate profit.
David Braue | 31 Jul | Read more
Hacking for fun and profit? Not so much; these days it’s mostly just about profit.
David Braue | 24 Jul | Read more
All the security defences in the world are worth nothing if employees compromise them
David Braue | 21 Jul | Read more
Despite all the investment in cybersecurity technologies, all the hiring of technical experts, all the millions spent on expensive security consultants, today’s businesses have made little progress resolving what remains the biggest paradox of information security.
David Braue | 21 Jul | Read more
Tesla is working to make sure a fleet-wide attack can't occur, Musk told attendees at the National Governors Association
While there is a general consensus that the Knightscope security robot in Washington, D.C., committed suicide on Monday, the same everyone-agrees-opinion is not true for the $7.4 million heist of the cryptocurrency Ether that happened on the same day.
Give this list to your employees, then go phish yourself
Steve Morgan | 19 Jul | Read more
Mobile malware accounted for nearly 1 in 10 malware strains detected during the first quarter, Fortinet has warned on the back of research findings that also suggested that a similar proportion of companies had been hit by ransomware during the quarter.
David Braue | 14 Jun | Read more
Red teaming is a well-known tool for improving your resilience to a cyber-attack. The idea is you have a team of people, either internal experts or internal people learning the craft with the support of external partners such as penetration testers, who play the part of hackers trying to infiltrate your organisation and execute a cyber-attack.
Anthony Caruana | 09 Jun | Read more
Any company operating a multi-storey office building would develop painstaking fire escape plans, and any hospital would develop backup plans detailing how it could operate in the event of a power failure. So, if responsible businesses are actively addressing these risks, why are so many companies still failing to lay down detailed plans for dealing with a cybersecurity incident?
David Braue | 08 Jun | Read more
The story of how Samy Kamkar made his reputation in information security is the stuff of legend. After getting his first computer as a ten year old, he started exploring the Internet through message boards, IRC, gaming and creating hacks and cheats for the games, before moving on to other forms of online activity.
Anthony Caruana | 01 Jun | Read more
Security researchers are pressing ahead with a problematic plan to pay for access to monthly dumps from the murky Shadow Brokers operation.