ACIC: Business email fraud victim numbers rise in Australia
More Australian organizations are falling prey to email fraudsters.
More Australian organizations are falling prey to email fraudsters.
Australian IT decision-makers are more confident than overseas peers that their midsized businesses are “completely ready” to deal with IT security threats – but they may be underinvesting in security as a result, according to new research that pegged the cost of the average successful attack at $1.89m.
David Braue | 02 Aug | Read more
It's just as shady and dangerous as ever, but something has changed in the way the dark web does business, and it will look very familiar to IT buyers.
Josh Fruhlinger | 24 Jul | Read more
Trained continually by ever-expanding masses of security data, AI promises to finally help CSOs keep up with the flood
David Braue | 24 Jul | Read more
Popular IoT messaging protocol lacks encryption and sufficient device authentication security.
CSO Webinar: Removing the hype and complexity around today's security threats
Microsoft's Patch Tuesday has its first security update for the HoloLens headset.
A disgruntled former employee, used off-the-shelf tools to destroy files and cause mayhem for Navarro Security
Christopher Burgess | 11 Jul | Read more
The role of artificial intelligence in improving security defences has expanded dramatically in recent years – but it may have expanded a bit too far, with a UK court blasting the provision of patient healthcare data to Google’s DeepMind for analysis.
David Braue | 10 Jul | Read more
Growing business engagement with issues around cybersecurity risk means the CISO function should ideally be moved out of the IT organisation, a senior security policy advisor has argued as organisations increasingly adopt business-level controls on growing software-as-a-service (SaaS) adoption.
David Braue | 23 Jun | Read more
With so much emphasis on impending obligations under the federal government’s Notifiable Data Breaches (NDB) regime, many Australian companies are yet to appreciate their obligations under new European privacy guidelines that will go into effect just 3 months after the NDB.
David Braue | 13 Jun | Read more
Nearly all security executives anticipate being attacked online this year but nearly half believe their cybersecurity team lacks the resources to address anything beyond simple security issues, according to new ISACA research that reinforces the growing risks posed by an increasingly-expensive cybersecurity climate.
David Braue | 07 Jun | Read more
Christina Camilleri is a security analyst at Bishop Fox, a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech start-ups. Although she works on the “right” side of the security business, she is not only interested but also highly skilled in penetration testing and red teaming – assuming the role of a hacker in security exercises.
Anthony Caruana | 31 May | Read more
The virtual world is full dangers lurking at every corner. You may never know when someone hacks into your device, online accounts, computer, etc. Most internet users – especially Aussies – believe they won’t ever fall victim to cyber-crime. However, they are sadly mistaken. Don’t wait until you become a victim. Instead, be proactive and take the required measures to protect your online privacy and financial transactions. Here are some ways to protect yourself from hackers and third-party agencies.
HP will soon issue an update to remove a keylogger present on dozens of HP laptop models.
Security researchers and law enforcement can now use Shodan to search for malware servers that are used to control infected computers.
The 27-year sentence handed down to a 32-year-old Russian hacker set the high water mark for cybercriminal prosecution. Security firm Webroot was also in trouble after its endpoint security product inadvertently began tagging Windows system files as malware – rendering their systems unusable. This, as experts offered |tips for protecting older Windows Server machines.
David Braue | 02 May | Read more
US Air Force looks to hackers from all Five-Eyes nations to help plug up previously unseen security flaws.
Hackers access HipChat Cloud chats and account information.
Australian government moves to curb abuse of 457 visas had a concerning side effect as IT-security positions were relegated to a short-term visa category that offers no potential pathway to permanent residency – potentially making Australia a less attractive destination for overseas security talent.
David Braue | 24 Apr | Read more