CSO Webinar: Putting your data somewhere safe is one thing – but can you get it back when you need it?
Today’s businesses are producing so much data that a core part of IT strategy is just finding somewhere to store it.
Today’s businesses are producing so much data that a core part of IT strategy is just finding somewhere to store it.
Microsoft reacted because the attack could have spread ransomware even though the goal was a 'relatively harmless' cryptocurrency miner.
Attacks on Bitcoin wallets hone in on Windows clipboard because cryptocurrency addresses are long and complex.
Days out from the introduction of the Notifiable Data Breach (NDB) scheme, new figures suggest around half of Australian small businesses still aren’t confident they can comply with its requirements.
David Braue | 12 Feb | Read more
Although the strength and number of distributed denial of service (DDoS) attacks in Australia dropped precipitously during 2017, one expert warns that the change in attack patterns actually reflects an intentional move by threat actors seeking to do as much damage as possible in ever-smaller windows of opportunity.
David Braue | 25 Jan | Read more
Italian-made Android spyware "one of the most powerful" surveillance tools for Android ever seen, according to malware researchers at Kaspersky Lab.
A WebLogic exploit is proving popular with criminals who free ride off company servers to mine the cryptocurrency Monero.
City and state authorities may be embracing Internet of Things (IoT) technologies to power ‘smart city’ initiatives around the world, but one expert has warned that the technology’s rapidly-broadening scope means IoT security must be addressed at an ecosystem level as a matter of public safety.
David Braue | 09 Jan | Read more
With all the talk associated with North Korea's prospects of launching a nuclear attack, there is often an overlooked, existential threat that continues to fly under the radar - cyber attacks.
Eric O’Neill | 10 Nov | Read more
Google gives Android vendors a fix for the KRACK wifi bug affecting 820 million devices. How long will it take for Android OEMs to deliver the patch to end-user devices?
Revelations that 30GB of sensitive Australian military data were exfiltrated from a subcontractor have underscored the risk faced by Australian companies that continue to leave themselves exposed by failing to employ “established and relatively straightforward cyber security measures”, the federal government’s peak cybersecurity body has warned as new data points confirms that local businesses are seeing increasing losses to cyber-attackers.
David Braue | 06 Nov | Read more
Australians are becoming more concerned about their privacy and businesses are signing on for privacy-awareness activities as a result, the government’s information commissioner has noted as figures suggest 40 percent of Australians are uncomfortable with the government using their personal details for research or policy-making purposes.
David Braue | 20 Oct | Read more
Google has unveiled a new locked down version of Gmail that trades convenience for a lot more security.
Distributed denial of service (DDoS) specialists can shut down an attack in 90 seconds once it’s detected – but if you take more than 3 hours to respond you’re likely to be compromised by a related attack in the meantime, warns a security expert who is seeing easy-to-source DDoS attacks becoming smokescreens for brazen data theft.
David Braue | 17 Oct | Read more
Your neighbors and anyone nearby now has a way to steal your passwords and snoop on what you're looking at on the web.
Dr Charlie Miller has been tagged as one of the world's best hackers after compromising a Jeep Cherokee from 10km with his colleague Chris Valasek.
Anthony Caruana | 13 Oct | Read more
The controversial application of face-recognition technology to millions of Australian driver’s license photos is a “relatively small database” in global terms, according to a biometrics executive who says today’s face-recognition algorithms are fast enough to scan thousands of faces at a time and robust enough to secure everyday financial transactions.
David Braue | 11 Oct | Read more
Ransomware and pretend-ransomware are terrible for your business, but they could help spawn the cyber insurance market.
Cybersecurity firms are redoubling their commitment to sharing cybersecurity knowledge as the government’s new “global in perspective in regional and focus” digital engagement strategy positions cybersecurity as key to promoting and commercialising Australian digital expertise across the Asia-Pacific region.
David Braue | 04 Oct | Read more
Manufacturers of medical devices and other Internet of Things (IoT) tools are increasingly seeking help to review and secure their source code, according to an Australian security consultancy that will soon hold a formal ‘hack day’ in which its researchers will each try to compromise a different IoT device.
David Braue | 28 Sep | Read more