The Australian Defence Force (ADF) has the primary purpose of defending Australia against armed attack such as the Japanese air raids on Darwin and northern Australia during WWII. It also participates in UN peace keeping, operations with allies such as the USA and disaster relief. In essence the ADF is a form of “insurance” against security threats to our nation.
Neerav Bhatt |
25 Aug |
Read more
A former US Department of Health purchasing agent who claimed to be a victim of identity theft faces 10 years jail after pleading guilty to stealing $114,000 of government funds to purchase goods on Amazon.
Liam Tung |
23 Aug |
Read more
Researchers have documented a method for working out ATM PIN numbers using residual traces of heat left on keypads after they have been touched by a person's fingers.
John E Dunn |
18 Aug |
Read more
Can the Obama administration fix your identity management problems?
Ellen Messmer |
18 Aug |
Read more
UK police forces are reportedly trialling facial recognition systems in a bid to catch rioters, as the authorities step up their use of technology in their investigations into the trouble last week.
Leo King |
16 Aug |
Read more
For two decades, the dominant security model has been location-centric. We instinctively trust insiders and distrust outsiders, so we build security to reflect that: a hard perimeter surrounding a soft inside. The model works best when there's only one connection to the outside, offering a natural choke point for firewall defense.
Andreas M. Antonopoulos |
15 Aug |
Read more
Bank customers who still want to use a teller but are tired of queuing up at lunchtime will soon have a faster option if the big four banks decide to roll out NCR's APTRA video automatic teller machine (VTM).
Hamish Barwick |
15 Aug |
Read more
Not unlike the <a href="http://www.networkworld.com/news/2011/080511-security-rundown.html">week before</a>, this past week saw hacking once again grab everyone's attention. This time it was <a href="http://www.networkworld.com/news/2011/081011-anonymous-allegedly-threatens-to-kill.html">an alleged threat</a> from the shadowy group <a href="http://www.itworld.com/security/192665/rumor-anonymous-trying-kill-facebook-fake">Anonymous</a> to "kill" the social-networking site Facebook. The reason given? Anonymous supposedly thinks Facebook abuses people's privacy and cooperates with authoritarian governments.
Ellen Messmer |
13 Aug |
Read more
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note that it will likely favor the submitter's approach.
Dave Pack, CISSP, manager, knowledge engineering, LogRhythm Inc. |
13 Aug |
Read more
EMC has squirrelled away US$81.3 million in reserve to cover the cost of customer remediation in response to the attack on RSA’s SecurID system it revealed in March.
Liam Tung |
09 Aug |
Read more
Leading US critical infrastructure security consultant Eric Byres has slammed security practices at Siemens following the demonstration of serious security vulnerabilities in their S7 programmable logic controllers (PLCs) at Black Hat 2011.
Stilgherrian |
08 Aug |
Read more
The South Australian government has recorded a decrease in crime levels, thanks to its updated Crime Mapper website.
Lisa Banks |
08 Aug |
Read more
While still not great, the operating systems behind Apple desktops, laptops and phones are getting more secure, <a href="http://www.networkworld.com/news/2011/080411-blackhat-overview.html?hpg1=bn">researchers at Black Hat</a> say.While not recommended for corporate use unless it’s in islands within larger networks, the OSX operating system has made strides, says Alex Stamos, who lead a team of researchers from iSec Partners that researched the OSX and Windows 7 operating systems.
Tim Greene |
08 Aug |
Read more
Stories about lost wages aren't the only scary things being talked about in Sin City this week. The best security researchers and hackers from around the world have gathered in Las Vegas, and news about their work has been creeping out like a toxic flood.
Christina DesMarais |
07 Aug |
Read more
Despite Microsoft’s efforts to make its User Access Control (UAC) security prompts less annoying, many users are still turning it off and in doing so helping thieves do their job, according to Microsoft.
Liam Tung |
05 Aug |
Read more
Every major corporation harbouring valuable information has been compromised, but only some know it, according to executives at McAfee and RSA.
Liam Tung |
04 Aug |
Read more
Research in Motion’s (RIM) PlayBook tablet and a crypto product by its subsidiary have gained a key security credential that clears its path for use within US government and may signal RIM's wider plans to lure enterprise buyers.
Liam Tung |
25 Jul |
Read more
An iPhone-based device will soon let police forces identify within seconds a suspect based on facial features, fingerprints, or now the unique features of the human eye.
John Cox |
22 Jul |
Read more
Romanian law enforcement on Friday arrested more than 100 people alleged to be involved in a multi-million dollar US-Romanian fraud network.
Liam Tung |
18 Jul |
Read more
Managing consumer or citizen identities comes with two key problems--scale and cost--prompting organizations that require onboarding, authentication, and <a href="http://www.csoonline.com/article/684895/password-management-systems-how-to-compare-and-use-them">password management</a> to look for ways to outsource this effort. Entertainment websites, online retailers, and even US federal government-to-citizen websites are experimenting with a federated model for more of their identity management life cycle. By using single sign-on (SSO) and attribute-sharing between "social" identity providers (IdPs) (i.e. Google and Facebook) and relying parties (RPs), this model effectively reduces cost and improves the customer experience.
Eve Maler |
14 Jul |
Read more