Some 100,000 photos taken from Snapchat users weren't the service's fault, although some observers were seizing on the leak to argue for an improvement in security by Snapchat and other online services. Ditto Dropbox, which was also denying it was to blame after hackers published what they claimed were excerpts from 7 million Dropbox credentials; the cloud-storage giant blamed a third-party service for the leak, but security experts were still using the event to push their case for users to adopt two-factor authentication – particularly given that cloud security and ubiquitous identity for cloud services is still over a year away.
David Braue |
21 Oct |
Read more
Governments hold a unique position in the establishment of new authentication schemes and must therefore take the lead in building out new mobile-based identity platforms to securely enable the delivery of a range of key services to their citizens, the Secure Identity Alliance has argued in a new white paper.
David Braue |
16 Oct |
Read more
Microsoft announced its upcoming Australian version of its Azure cloud platform had achieved government security certification. On similar lines, Microsoft also joined other technology providers in promising to protect student privacy, and developed a new way to securely isolate data and applications from the cloud infrastructure they're running on.
David Braue |
14 Oct |
Read more
Responding to complaints by the US government over mobile device encryption, Google chairman Eric Schmidt has said the company’s hand was forced by government hacking.
Liam Tung |
09 Oct |
Read more
Less than a week after it was revealed by UK-based Akamai security researcher Stephane Chazelas, the threat posed by the newly discovered Shellshock vulnerability – said by some to be bigger than Heartbleed” – is still being reassessed as security experts around the world zero in on the recently discovered Bash shell flaw and the extent of the world's exposure to the bug becomes clear.
David Braue |
01 Oct |
Read more
Rising concerns about terrorist threats on Australian soil have increased the acceptability of data-retention proposals to citizens but the majority favour tight controls over its use, according to a recent survey of Australians' attitudes to cybersecurity.
David Braue |
24 Sep |
Read more
Foreign Minister Julie Bishop’s phone was hacked during talks she led overseas for access to the MH17 crash site in the Ukraine.
Liam Tung |
18 Aug |
Read more
Usage statistics confirm that sports fans love connecting to public WiFi services for use during sports matches, with the large numbers of users and masses of data being transferred during World Cup matches confirming the need not to be tricked into connecting into a rogue access point at the event.
David Braue |
01 Aug |
Read more
Australians are the third most-frequent victims of a new infection vector for 'Koler' ransomware, which emerged in April and was targeting both mobile and PC users with 'Australianised' content until it began uninstalling itself from infected mobiles this week.
David Braue |
29 Jul |
Read more
Continuous improvement in natural-language speech recognition (NLSR) technology and its transfer onto mobile devices are helping cement voice biometrics as a viable alternative mechanism for user authentication, a biometrics expert believes.
David Braue |
24 Jun |
Read more
Faced with dramatic change in their roles, CSOs need to re-evaluate their security strategies in terms of capitalising on the new capabilities of cloud and mobile rather than perceiving them simply as security threats, an IBM security expert has advised.
David Braue |
23 Jun |
Read more
Kaspersky Lab’s collection of mobile malware now contains more than 340,000 of unique malware samples, with more than 99 per cent targeting Android.
Patrick Budmar |
16 Jun |
Read more
A Symantec report has found one in three Australian children have been the victim of cyberbullying.
Patrick Budmar |
03 Jun |
Read more
Information and system security is a complicated business that comes down to a few very basic concepts. Issues of trust and identity are central to effective information and system security. The trouble is, we often struggle to understand what these two things mean and have an even harder time trying to prove them.
Anthony Caruana |
22 May |
Read more
A decade may have passed since mobile malware showed up, though Fortinet said the biggest shifts took place in the last two years.
Patrick Budmar |
01 May |
Read more
Advertisements with embedded malware have outpaced pornographic Web content as the biggest threat to the security of mobile devices, new figures from security firm Blue Coat suggest.
David Braue |
12 Mar |
Read more
Samsung and Microsoft have tied up a deal around Knox and Windows Server 2012 R2 that should make it easier to put Galaxy Android BYOD devices on the corporate network.
Liam Tung |
03 Mar |
Read more
Human error remains the biggest moderate concern for IT administrators but is losing ground to malware, hacking, cloud computing, and social engineering on the security-threat leaderboard, recent figures from industry association CompTIA have revealed.
David Braue |
07 Feb |
Read more
CSOs concerned about the pace of mobile technology adoption and its security implications will find little solace in the latest Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018, which has presaged an exploding IT-security threat as machine-to-machine (M2M) and other devices push the number of connections to more than 10 billion by 2018.
David Braue |
06 Feb |
Read more
Mobiles on 4G networks comprise the lion's share of the more than 11.6 million mobile devices infected with malware at any given time, with the rate of mobile infection soaring ahead of infections of fixed-broadband users, according to new research into malware infections released by Alcatel-Lucent subsidiary Kindsight.
David Braue |
31 Jan |
Read more