The battle to block the Web has bogged down in the Federal Court where counsel representing Foxtel and Village Roadshow argued that the Court should adopt the quixotic reasoning presented and dump the almost 'impossible' task onto Internet Service Providers (ISP).
Mark Gregory |
19 Jul |
Read more
Five years ago Mozilla launched an identity management system, Persona (originally called BrowserID).
V. Balasubramanian |
30 May |
Read more
Australian companies are seriously lagging behind their US and UK counterparts when it comes to cyber security. According to Deloitte, Australian companies could risk becoming “low-hanging fruit” for cyber criminals due to a lack of education and an unwillingness to properly deal with cyber threats.
Liam Rowland |
27 Apr |
Read more
In a combat situation, our soldiers wear and carry different types and amounts of equipment, compared to when they are on normal duties. In some high risk situations they’re expected to carry around 60 kilograms worth of kit, including their gun, ammunition, armour, helmet and boots.
Nick Race |
12 Apr |
Read more
Insider threats are increasingly on our radar, we saw a recent example in Australia with an Bluescope Steel employee taking out company documents. Also two scientists at Glaxo Smith Kline research scientists in another well publicised incident- Yu Xue and Lucy Xi, were charged with stealing trade secrets.
David Gee |
01 Apr |
Read more
With the festive season fast approaching, online retailers everywhere will be busily preparing themselves to meet the bulk demands of customers but another community is also waiting in the wings. The festive season is a primetime for nefarious cyber criminals or hackers looking to steal important data of your customers. With passage of time, hackers are improving their skills and are founding quite innovative ways to trace online behavior and steal credentials of the customers.
Joy Mali |
20 Mar |
Read more
As organizations try to rein in technology budgets, IT staff members are constantly tasked with doing more and providing better services, all the while keeping costs and staff to a minimum. Couple this with increased usage of applications in the cloud, and the security issues entailed therein and you have a perfect combination for delays and disgruntled users.
Dean Wiech |
16 Feb |
Read more
Israeli security researchers Gadi Evron and Imri Goldberg find that security theatre can be about more than window dressing.
Gadi Evron and Imri Goldberg |
11 Dec |
Read more
Via the RISKS mailing list comes an interesting tale of poor online account management at a major online retailer. According to Graham Bennett, accounts with Amazon display an odd behaviour that doesn't seem to have attracted much attention in the past.
Carl Jongsma |
09 Oct |
Read more
Reformed hacker-turned-security-consultant Kevin Mitnick served five years in federal prison for breaking into phone and software company networks. He talks about his past hacking exploits, computer security, and how he turned an illegal hobby into a useful career.
Jarina D'Auria |
16 Jul |
Read more
It has been a number of years since the fantasy that hackers will be offered a job by those who they hacked was even a potential reality, but there are reports that this might still be the case in New Zealand.
Carl Jongsma |
16 Jul |
Read more
The Internet Storm Center, operated by SANS, is one of the leading sources when it comes to identifying emerging attacks against networks, through their DShield collaborative network analysis effort. Traffic spikes on network ports that are well above the normal rates of traffic flow can signify a rapidly spreading exploit or it could be a misconfigured network spewing rubbish across the rest of the Internet. One of the ISC's handlers noted a significant spike of traffic on port 7 recently and was surprised by what he found.
Carl Jongsma |
10 Jul |
Read more
Version 3.0 of BackTrack has been released. BackTrack is a Linux-based distribution dedicated to penetration testing or hacking (depending on how you look at it). It contains more than 300 of the world's most popular open source or freely distributable hacking tools.
Roger A. Grimes |
30 Jun |
Read more
When determining the risk to a system and the data stored on it, insider threats are generally regarded as lower risk. Despite the complete access (high risk) that insiders generally have, most of the time insiders are trusted agents (very low risk) on the network. When it breaks down, it can break down in a catastrophic manner, especially if there is money at stake.
Carl Jongsma |
18 Jun |
Read more
A less known part of the recent ARP attack against H D Moore's MetaSploit site was an attempted Denial of Service attack that coincided with the successful ARP attack.
Carl Jongsma |
11 Jun |
Read more
People don't notice change when it's gradual. Sometimes, however, small, incremental changes add up in a way that isn't noticed until a change in degree becomes a change in kind.
Andreas M. Antonopoulos |
19 Mar |
Read more
Question: We have contractors perform a number of critical services, such as managing our IBM blade servers. These staff have to be on the LAN, and they're long-time contractors, so trust levels run pretty high, but I know they shouldn't be able to go everywhere on the LAN. How can I limit their access while still letting them do their jobs, and most important, not making them feel like I don't trust them?
Andre Gold |
17 Jul |
Read more