Mobile Security — News

Stuxnet, Snowden and Sony: Why we've passed the cyber security tipping point

Heavy-handed pressures from tech-unaware legislators, successful strikes by laterally-thinking hackers, a growing tide of dissent about government intervention and corporate concerns about last year's massive hack of Sony Pictures corporate documents have pushed us past the security tipping point into an environment where cyber-attacks will increasingly become favoured tools of nation states and terrorist groups, a leading security journalist has warned.

David Braue | 06 Mar | Read more

Message security in spotlight as 'Minister for Encryption' Turnbull reasserts importance of privacy

Efforts to improve the security of internal business information, particularly in the context of the government's push to improve its access to data, are driving new investments in secure communications tools as no less than Australia's Minister for Communications came out this week in support of using encrypted communications channels to protect sensitive information.

David Braue | 04 Mar | Read more

Is fragmentation killing Android in the enterprise?

Android may rule consumer smartphone shipments, but it’s getting trounced in the enterprise. So is Google’s new enterprise mobile security plan up to the task of raising Android's measly share of the enterprise? The answer may lie in the diversity of "the enterprise".

Liam Tung | 27 Feb | Read more

PM spruiks data retention as report blames Snowden for poor data sharing

“Strained” relationships between intelligence and business had impeded information sharing and compromised national security as a result, a report into Australia's counter terrorism capabilities has warned as Australian prime minister Tony Abbott stepped up his rhetoric about the need for data-retention legislation in a speech on national security this week.

David Braue | 24 Feb | Read more

The week in security: Data retention looms, Superfish gutted

Are your staff suitably trained to detect and ignore phishing spam? If not, you may want to revisit your policies: in the latest security embarrassment, banks in 30 countries have been systematically deprived of more than $US1 billion by cybercriminals due to what many are attributing to poor staff training around the handling of malware threats. Indeed, despite billions spent on security tools one study found that researchers were able to garner sensitive information in 88 percent of attempts just by using their eyes.

David Braue | 24 Feb | Read more

The 2015 Social Engineering Survival Guide

Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it's often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection.

George V. Hulme | 23 Jan | Read more

The week in security: Obama promotes breach sharing, hackers do same

Big-name security tools aren't catching anywhere near all of the malware they are presented with, according to the latest lab testing results from Enex Labs, which found during testing in the second half of 2014 that as many as 100 percent of tested malware was making it through the defences of eight popular security tools. The results were corroborated by a FireEye study that found traditional security defences simply are not stopping security breaches.

David Braue | 19 Jan | Read more