David Lewis, the Technical Director of Cyber Security Analysis and Operations, Australian Signals Directorate, had perhaps the most "interesting" presentation title of the Oceania CACS conference.
Anthony Caruana |
14 Sep |
Read more
"Today we face a different kind of threat. To take us down, it only takes one point of breach. The only question is - will it be you?"
Anthony Caruana |
02 Sep |
Read more
Twitter has suspended at least two accounts that were spreading links to spyware aimed at people who sympathise with terrorists.
Liam Tung |
28 Jul |
Read more
Any service provider to the US government that relies on SMS for two-factor authentication may need to swap the method for something with fewer design weaknesses.
Liam Tung |
27 Jul |
Read more
Empowered by big-data analysis, security researchers are finding new ways to pinpoint the sources of botnets, login account hacking and fraud exploits that will allow businesses to proactively evaluate and manage their exposure to financial and other risks.
David Braue |
15 Jul |
Read more
After people and process, another way to combat the insider threat is from a technology perspective and look at the various devices that can be leveraged to reduce this threat.
Brian Contos |
08 Jul |
Read more
Australia may be China's sixth-largest trading partner, but an analysis of the country's allegedly state-sponsored hacking activities suggests that several other countries are seen as being more important targets for their cyber-espionage activities.
David Braue |
24 Jun |
Read more
The government's recent $230m commitment to build Australia's national cybersecurity defence was welcomed by industry and notable for many reasons, but observers were quick to point out that the new Cyber Security Strategy (CSS) marked the first time the government had publicly stated that it was ready to go on the offensive against hackers.
David Braue |
02 Jun |
Read more
What is your identity? Depending on who you ask you’ll get very different answer. Family members will respond with information like your name, birthday and who your parents are. But in the office, your identity is probably more likely to be associated with your job title or role.
Anthony Caruana |
30 May |
Read more
Ten years ago, security was a line item in most company IT strategies, if it was mentioned at all. But with the advent of mega-breaches in late 2013 through to nation state attacks such as the OPM breach a year ago IT security has leapt into the boardroom and C-suite.
Anthony Caruana |
14 Apr |
Read more
Australian online-classified site Gumtree was hacked and used to spread malware via online display ads, while a large US healthcare provider was shut down after a malware infection and only partially recovered days later.
David Braue |
04 Apr |
Read more
Google has removed dozens of Android apps in Google Play posing as battery management tools that may have leaked millions of users’ email addresses to criminals.
Liam Tung |
04 Apr |
Read more
Snapchat says its payroll department leaked confidential data to attackers who posed as the company’s CEO Evan Spiegel in a phishing email.
Liam Tung |
01 Mar |
Read more
Criminals who use the Internet for drug crimes, fail to provide their passwords to police or use online anonymising services for child exploitation, would attract additional sentences under a host of Queensland Organised Crime Commission of Inquiry (QOCCI) recommendations that also include suggestions that the Queensland Police Service (QPS) train cybercrime investigators to monitor and “infiltrate” the online drug trade.
David Braue |
06 Nov |
Read more
Today's launch of Apple's in-demand iPhone 6S has mobile-security pundits hitting the pulpits to remind mobile users that increasingly capable mobile-payments platforms carry novel risks on top of existing exposure to data movement and fluidity.
David Braue |
25 Sep |
Read more
The federal joint parliamentary committee on law enforcement has recommended that the Attorney-General’s Department to review rules by which fraud victims are granted legal recognition.
Andrew Colley |
08 Sep |
Read more
British citizen Junaid Hussain, an ISIS hacker who was once charged with stealing Tony Blair’s personal details, has been killed by a US drone strike in Syria.
Liam Tung |
27 Aug |
Read more
Despite Ashley Madison using a recommended encryption algorithm to protect user passwords, a portion of them have been cracked revealing once again that people pick bad passwords.
Liam Tung |
26 Aug |
Read more
A cyberattack on the US Internal Revenue Service, reported earlier this year, now seems to be worse than originally thought. Yet the most attention was on the publication of the records from the recent Ashley Madison hack, which set tongues wagging around the world and had the site's parent company scouring the records to confirm their authenticity. Analysis of the released records, which include source code and email records, showed that internal technical experts had raised concerns about the site's security as much as a year ago. And some believe the high-profile hack willlead to a tiered Internet, while others believe it has important lessons for CSOs and could lead to a wave of spear phishing attacks.
David Braue |
24 Aug |
Read more
Changes to security exposure, driven by shifting organisational network boundaries, have driven a resurgence in identity and access management (IAM) that has the government committing to significant IAM frameworks and private companies retrofitting IAM to legacy systems. Yet for fast-growing digital business REA Group, a flexible IAM environment has rapidly evolved from being a nice-to-have into a fundamental element of the company's IT strategy.
David Braue |
18 Aug |
Read more