Cold storage market heats up with Google’s new Nearline
Google is teaming up with Symantec and others to enter the ‘cold storage’ market for information that needs to be kept but isn’t accessed frequently.
Google is teaming up with Symantec and others to enter the ‘cold storage’ market for information that needs to be kept but isn’t accessed frequently.
Apple released a new iOS update that prepares iPhones for the Apple Watch but also fixes serious security bugs, including the recently discovered flaw known as FREAK.
Distributed denial of service (DDoS) attacks are the most worrying type of online attack for businesses and reputational damage and unhappy customers are among the most feared outcomes of such an incident, a new customer survey has revealed.
David Braue | 06 Mar | Read more
Heavy-handed pressures from tech-unaware legislators, successful strikes by laterally-thinking hackers, a growing tide of dissent about government intervention and corporate concerns about last year's massive hack of Sony Pictures corporate documents have pushed us past the security tipping point into an environment where cyber-attacks will increasingly become favoured tools of nation states and terrorist groups, a leading security journalist has warned.
David Braue | 06 Mar | Read more
Adobe has joined a bug disclosure program that invites researchers to report new flaws in its web applications. What can hackers expect for their work? Not a cash bounty.
Efforts to improve the security of internal business information, particularly in the context of the government's push to improve its access to data, are driving new investments in secure communications tools as no less than Australia's Minister for Communications came out this week in support of using encrypted communications channels to protect sensitive information.
David Braue | 04 Mar | Read more
Google is deprecating Android 4.0 (Ice Cream Sandwich) support for Chrome with the final update expected to arrive in April and no more security patches from mid-May.
Google has quietly stopped requiring that Android OEMs enable full-disk encryption by default in new Android 5.0 Lollipop devices, backtracking on its widely publicised plan to make life harder for snoops and police.
The rate of new software vulnerabilities jumped dramatically between 2014 and 2013, with 19 new vulnerabilities disclosed every day last year and an upwards trend suggesting things could only get worse this year.
David Braue | 27 Feb | Read more
Android may rule consumer smartphone shipments, but it’s getting trounced in the enterprise. So is Google’s new enterprise mobile security plan up to the task of raising Android's measly share of the enterprise? The answer may lie in the diversity of "the enterprise".
Google has taken the wraps off Android for Work, the BYOD enterprise program it’s been brewing with mobile device management (MDM) partners for months and borrows from Samsung’s container technology KNOX.
“Strained” relationships between intelligence and business had impeded information sharing and compromised national security as a result, a report into Australia's counter terrorism capabilities has warned as Australian prime minister Tony Abbott stepped up his rhetoric about the need for data-retention legislation in a speech on national security this week.
David Braue | 24 Feb | Read more
Are your staff suitably trained to detect and ignore phishing spam? If not, you may want to revisit your policies: in the latest security embarrassment, banks in 30 countries have been systematically deprived of more than $US1 billion by cybercriminals due to what many are attributing to poor staff training around the handling of malware threats. Indeed, despite billions spent on security tools one study found that researchers were able to garner sensitive information in 88 percent of attempts just by using their eyes.
David Braue | 24 Feb | Read more
Dutch SIM card maker Gemalto says its SIM cards are “secure” despite a report that US and UK spies hacked the company and stole encryption keys that would allow them to intercept mobile communications.
Identity-management provider Centrify has extended its capabilities to the emerging Hadoop big-data analysis platform, offering a suite of management tools that allow control over Hadoop systems using existing Microsoft Active Directory (AD) infrastructure.
David Braue | 20 Feb | Read more
It can be weeks or months before conventional antivirus solutions can properly detect new malware signatures, security firm Damballa has warned after an analysis showed that 28 percent of malware took more than a week to be addressed through a signature update.
David Braue | 19 Feb | Read more
Cisco has warned customers that hackers are attacking un-patched versions of software that run its Adaptive Security Appliance (ASA) firewall.
Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it's often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection.
George V. Hulme | 23 Jan | Read more
So-called 'shadow IT' – technology solutions, often cloud-based, that are purchased by individual departments without oversight from central IT organisations – has proved to have a silver lining, with CIOs finding that departments' increasing IT autonomy is giving CIOs more time to focus on creative IT strategies and solutions, a new survey has found.
David Braue | 20 Jan | Read more
Big-name security tools aren't catching anywhere near all of the malware they are presented with, according to the latest lab testing results from Enex Labs, which found during testing in the second half of 2014 that as many as 100 percent of tested malware was making it through the defences of eight popular security tools. The results were corroborated by a FireEye study that found traditional security defences simply are not stopping security breaches.
David Braue | 19 Jan | Read more