Concerted industry efforts are likely to produce a decryption tool for the WannaCry ransomware attack within months, the head of one vendor’s security team has predicted while warning that the attack’s emboldened creators may be using it as a distraction for other malicious activity.
David Braue |
18 May |
Read more
Australian businesses need to stop talking about diversity and undertake concrete steps to remedy the chronic under-representation of women and minority groups within ICT roles, an Australian Computer Society (ACS) executive has warned as figures suggest that efforts to attract women to ICT-related roles continue to flounder.
David Braue |
24 Feb |
Read more
Cybercriminals are collaborating to refine their attacks and businesses must do the same by leveraging a growing body of open-source security tools, a security expert has advised as open-source machine learning puts the technology into the mainstream.
David Braue |
22 Dec |
Read more
The recent distributed denial of service (DDoS) attacks on managed DNS provider Dyn, which knocked out top websites like Spotify, Amazon and Twitter, has forced lawmakers to search for answers to the problem of inherently insecure Internet of Things (IoT) devices, such as webcams, DVR, printers and routers.
Liam Tung |
07 Dec |
Read more
Every breach, whether it’s a Distributed Denial of Service (DDoS) attack, hack of a corporate database or phishing attack starts in the same place. An endpoint device is accessed and used by an unauthorised party or a user is coerced into using that endpoint in an unintended way.
Anthony Caruana |
06 Dec |
Read more
Beginning January Google will start using full page warnings in Chrome when the browser encounters sites using TLS/SSL or digital certificates signed with the aging SHA-1 hashing algorithm.
Liam Tung |
18 Nov |
Read more
Firms in the $50bn online ad industry can now apply for a security seal to signal they’ve done enough to prevent criminals exploiting news to spread ransomware.
Liam Tung |
16 Nov |
Read more
Ashton Kutcher is best known as an actor and producer, but he is also a successful tech investor having taken stakes in companies such as Airbnb, Foursquare, Meerkat, Spotify and Uber.
Stephen Withers |
08 Nov |
Read more
Blockchain distributed-ledger technology is opening up new frontiers for financial services and other companies, but security specialists are pushing for early action on both blockchain and related account-management technologies to avoid the punishing security breaches being seen due to Internet of Things (IoT) shortcomings.
David Braue |
25 Oct |
Read more
Security experts have backed claims that flaws in heart implants made by St Jude Medical can be used to deliver electric shocks.
Liam Tung |
25 Oct |
Read more
With about five billion IoT devices connected today, with growth expected to reach 25 to 38 billion over the next five years it's clear something needs to be done to arrest the threat of billions of devices being recruited for nefarious purposes.
Anthony Caruana |
25 Oct |
Read more
There's been a significant shift in cyber-attacks over recent years. Although we often call this change an increase in sophistication, it's really a response to how security strategies have been developed and executed.
Anthony Caruana |
25 Oct |
Read more
Hackers behind the US Democratic National Committee (DNC) breach and several other profile cyberattacks had at least six zero-day exploits on hand and a custom-made exploit kit.
Liam Tung |
21 Oct |
Read more
Data breaches are inevitable and waiting for a breach to occur before designing an incident response plan is a recipe for failure. It’s a question of when the breach will occur and how you will respond, not if you will be breached. 100% prevention simply doesn’t exist, so having a plan to deal with a security breach is now more important than ever. You probably already have an incident response plan from a technical perspective. Phrases such as preparation, identification, containment, eradication and lessons learned.
Wayne Tufek |
15 Sep |
Read more
“When you look at international organised crime, it’s worth about $1.7 trillion a year. It’s made up six or seven key components. Those are things like counterfeiting, arms trade, drugs, people trafficking and smuggling, the sex trade,” he says.
Anthony Caruana |
31 Aug |
Read more
If you’re seeing scary ads claiming your Android phone is infected with malware, you might have installed a legitimate looking app that contains dodgy ad-serving software.
Liam Tung |
02 Aug |
Read more
Twitter has suspended at least two accounts that were spreading links to spyware aimed at people who sympathise with terrorists.
Liam Tung |
28 Jul |
Read more
Any service provider to the US government that relies on SMS for two-factor authentication may need to swap the method for something with fewer design weaknesses.
Liam Tung |
27 Jul |
Read more
A new Facebook Messenger vulnerability has been detected that makes it possible for an attacker to modify or remove any sent message including rich content such as photos, files, and links.
Anthony Caruana |
08 Jun |
Read more
Think your employees are too smart to fall for a targeted email scam? Think again.
David Braue |
02 Jun |
Read more