The Coalition Government is looking to push laws through the House of Representatives and Senate that would pave the way for vast swathes of data to be retained by certain agencies to either aid the detection of crime or to support criminal cases so that bad guys can be prosecuted and incarcerated
Anthony Caruana |
17 Feb |
Read more
Microsoft has gained third-party verification that its core cloud services adhere to a new international standard for handling private information in public clouds.
Liam Tung |
17 Feb |
Read more
US hotel chain Marriott may have copped a hefty fine for blocking Wi-Fi hotspots at its hotels, but the practice is set to become more common with the emergence of new solutions enabling other companies to do the same thing
David Braue |
16 Feb |
Read more
The federal government could substantially reduce the amount of data carriers need to store under its proposed metadata retention laws if its use was limited to investigations of higher-risk targets, Vodafone Australia says.
Andrew Colley |
30 Jan |
Read more
Nearly 40 percent of distributed denial of service (DDoS) attacks now rely on reflection techniques rather than brute-force breaches to seize control of the victim systems, a new analysis by Akamai's Prolexic Security Engineering and Research Team (PLXsert) has found.
David Braue |
30 Jan |
Read more
Crypto-ransomware hackers who have plagued PCs for the past two years have found a new tack — high value business websites.
Liam Tung |
30 Jan |
Read more
Australian companies are losing a significant amount of time dealing with what has been estimated to be up to 150 redundant security alerts per day, according to recent figures from security firm FireEye.
David Braue |
30 Jan |
Read more
Distributed denial of service (DDoS) attacks against Australian targets grew in intensity and a growing share of attacks is originating inside the country rather than outside of it, new research from Arbor Networks has found.
David Braue |
29 Jan |
Read more
Several security experts say GHOST, the latest far-reaching open source security bug, is a potentially serious threat and will be annoying to fix, but is probably not catastrophic.
Liam Tung |
29 Jan |
Read more
Researchers have discovered a serious vulnerability affecting multiple distributions of the Linux OS. While there are patches available the clean up effort is likely to going be a major task for Linux admins.
Liam Tung |
28 Jan |
Read more
On the heels of two real Flash Player security updates being distributed by Adobe Systems this week, hackers are spreading a fake update for the media player via a scam on Facebook that has exposed at least 5,000 users to the threat.
Liam Tung |
27 Jan |
Read more
Unified identity management provider Centrify has reported record sales during 2014, reflecting the growth in demand for cloud-based user authentication solutions as well as early successes for the company's partner-based growth strategy.
David Braue |
23 Jan |
Read more
Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it's often easier to trick someone into opening an email and exploiting a vulnerability that way, or convincing an unsuspecting assistant to provide a few useful bits of information, than it is to directly attack a web application or network connection.
George V. Hulme |
23 Jan |
Read more
Firefox users should probably disable Flash, with an attack that only worked on Internet Explorer (IE) yesterday now also effective against the Flash plugin for Mozilla’s browser. The good news? Microsoft has released a fix for affected IE users.
Liam Tung |
23 Jan |
Read more
More IT professionals in Australia and New Zealand are anticipating being hit by a cyber-security attack this year than their peers around the world, new figures from peak security body ISACA have revealed.
David Braue |
23 Jan |
Read more
An exploit kit known as Angler is targeting a previously unseen flaw in the latest version of Flash Player, which Adobe only updated a week ago.
Liam Tung |
22 Jan |
Read more
A 250 percent rise in spam volumes during 2014 has come as a surprise to a Cisco security executive in the wake of the company's latest security figures, which noted the trend in conjunction with a decline in the prevalence of malware attacks created using widely available exploit kits
David Braue |
21 Jan |
Read more
A hacker, said to be an Australian, may be one of the key members behind the Ukrainian separatist hacking group that claimed responsibility for attacks on German government websites earlier this month.
Liam Tung |
21 Jan |
Read more
So-called 'shadow IT' – technology solutions, often cloud-based, that are purchased by individual departments without oversight from central IT organisations – has proved to have a silver lining, with CIOs finding that departments' increasing IT autonomy is giving CIOs more time to focus on creative IT strategies and solutions, a new survey has found.
David Braue |
20 Jan |
Read more
Big-name security tools aren't catching anywhere near all of the malware
they are presented with, according to the latest lab testing results from
Enex Labs, which found during testing in the second half of 2014 that as
many as 100 percent of tested malware was making it through the defences of eight popular security tools. The
results were corroborated by a FireEye study that found traditional
security defences simply are not stopping security breaches.
David Braue |
19 Jan |
Read more