A new feature in Android keeps your passcode protected smartphone unlocked when it’s on your body — a move that reduces the hassle of typing a passcode but also leaves devices exposed to muggers.
Liam Tung |
24 Mar |
Read more
New team's mission is to deliver affordable and easy-to-use IT solutions for businesses to discover, manage and secure their networks
Chris Bowes |
23 Mar |
Read more
The importance of the human element in information security is sometimes lost amongst all the discussion about new technologies, but the usage of insecure email services by former US secretary of state Hilary Clinton has brought the issue into fine focus after it was revealed that her email remained unencrypted and unauthenticated for three months. Indeed, despite years of user education experts continue to warn that the 'human firewall' is continuing to suffer from significant weaknesses.
David Braue |
17 Mar |
Read more
BlackBerry has confirmed BlackBerry OS 10, BES 12 and 10 and other products are affected by the FREAK flaw, but it has no patch.
Liam Tung |
13 Mar |
Read more
The majority of companies handling personal financial details are failing to meet their obligations to adequately protect those details under compliance with Payment Card Industry Data Security Standards (PCI DSS) requirements, a scathing evaluation of ongoing compliance by Verizon has found.
David Braue |
12 Mar |
Read more
This week's launch of the Apple Watch has provided a focal point for security vendors who are flooding the market with new capabilities designed to prevent the Internet of Things (IoT) paradigm from becoming a runaway security threat.
David Braue |
12 Mar |
Read more
Proactive efforts to stop the rate of financially-targeted Trojans saw a 53 percent decline in infection rates during 2014 but ever-smarter malware is learning to evade new security measures, Symantec has warned after an analysis that found Australia suffered over 114,000 financial phishing attacks last year.
David Braue |
05 Mar |
Read more
The Australian government stepped up its push for mandatory data retention legislation, drawing out supporters and detractors as the controversial legislation pushed its way towards becoming law.
David Braue |
02 Mar |
Read more
Credit card providers Visa and MasterCard have confirmed they will roll out their tokenisation technology in Australia at some point in 2015 while Visa said the service will launch in Europe by mid-April.
Liam Tung |
25 Feb |
Read more
Microsoft has gained third-party verification that its core cloud services adhere to a new international standard for handling private information in public clouds.
Liam Tung |
17 Feb |
Read more
A surge in orders for small-format fingerprint readers suggests that fingerprint-recognition capabilities may be built into a broad range of consumer products by the end of this year, according to a report from Norwegian biometrics manufacturer NEXT Biometrics Group.
David Braue |
11 Feb |
Read more
Unified identity management provider Centrify has reported record sales during 2014, reflecting the growth in demand for cloud-based user authentication solutions as well as early successes for the company's partner-based growth strategy.
David Braue |
23 Jan |
Read more
Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it's often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection.
George V. Hulme |
23 Jan |
Read more
Big-name security tools aren't catching anywhere near all of the malware
they are presented with, according to the latest lab testing results from
Enex Labs, which found during testing in the second half of 2014 that as
many as 100 percent of tested malware was making it through the defences of eight popular security tools. The
results were corroborated by a FireEye study that found traditional
security defences simply are not stopping security breaches.
David Braue |
19 Jan |
Read more
Carberp, a banking trojan that recently hit over 150,000 Australian PCs, is taking a second bite at Australia through spam email loaded with malware.
Liam Tung |
16 Jan |
Read more
Security operations centers (SOC) have been around for a while, stretching back to the old room full of live camera feeds. The intent of a SOC is simple: provide the business with the ability to see what is going on in order to take action if necessary. The level of SOC sophistication varied depending on the risks and infrastructure complexity. Consider the humble stretch of road and an analogy for businesses in the very early days of the internet: In low risk, low traffic areas, it was often not necessary to have a constant additional surveillance of this road. Road rules -- basic perimeter-based network security measures like firewalls -- still applied, but it was considered sufficient for any out-of-the-ordinary incidents to be handled reactively.
Michael Lee |
20 Jan |
Read more
Just like the iPhone, Apple Watch will have a four digit passcode that users will need to type in before Apple Pay can be used for payments.
Liam Tung |
14 Jan |
Read more
Educators like to talk about the importance of teaching coding to students, but the network security protocols in place on some UK school networks are holding them back, according to some reports. No word on whether those same protocols will do much to stop the use of a new, free tool that automates the process of phishing for Wi-Fi passwords on open networks.
David Braue |
12 Jan |
Read more
Check Point® Software Technologies Ltd. today released its findings of Misfortune Cookie, a critical vulnerability that allows an intruder to remotely take over a residential gateway device and use it to attack the devices connected to it.
CSO staff |
19 Dec |
Read more
The newly-operational Australian Cyber Security Centre (ACSC) has kicked off its efforts to catalogue the incidence of cyber-security breaches, calling on businesses and government agencies to report breaches through a page on its Web site.
David Braue |
11 Dec |
Read more