A growing profile for managed services and the adoption of cloud-based security services are among the key security priorities expected to define the market in 2015, Dimension Data security experts have advised based on their regular interactions with clients during 2014.
David Braue |
15 Jan |
Read more
Malware authors continued to outpace security vendors in the second half of 2014, releasing so many and so varied malware strains that in some months security tools from major vendors did not detect any of the malware they were presented with, according to the results of eThreatz automated malware testing.
David Braue |
15 Jan |
Read more
Findings by content distribution network (CDN) provider Akamai that Australia is sliding down the world's broadband rankings got widespread coverage, but Akamai's review of global security exposure has also highlighted more pressing information-security concerns in Australia and elsewhere.
David Braue |
15 Jan |
Read more
Security operations centers (SOC) have been around for a while, stretching back to the old room full of live camera feeds. The intent of a SOC is simple: provide the business with the ability to see what is going on in order to take action if necessary. The level of SOC sophistication varied depending on the risks and infrastructure complexity. Consider the humble stretch of road and an analogy for businesses in the very early days of the internet: In low risk, low traffic areas, it was often not necessary to have a constant additional surveillance of this road. Road rules -- basic perimeter-based network security measures like firewalls -- still applied, but it was considered sufficient for any out-of-the-ordinary incidents to be handled reactively.
Michael Lee |
20 Jan |
Read more
US Central Command (Centcom) has dismissed the acts, which saw its YouTube and Twitter accounts briefly fall into the hands of hackers and used to distribute pro-ISIS messages as “cyber vandalism” and said that none of its military servers were compromised during the incident.
Andrew Colley |
14 Jan |
Read more
Just like the iPhone, Apple Watch will have a four digit passcode that users will need to type in before Apple Pay can be used for payments.
Liam Tung |
14 Jan |
Read more
A high-profile hack by terrorist group ISIS has reinforced the importance of new high-level cybersecurity initiatives that have won support from retail and banking leaders as US president Obama prepares to deliver his annual State of the Union address next week.
David Braue |
13 Jan |
Read more
Microsoft Scroogled website now redirects visitors to a more neutral website, but the company isn’t entirely ready to let go of its Google-bashing campaign yet.
Liam Tung |
13 Jan |
Read more
Educators like to talk about the importance of teaching coding to students, but the network security protocols in place on some UK school networks are holding them back, according to some reports. No word on whether those same protocols will do much to stop the use of a new, free tool that automates the process of phishing for Wi-Fi passwords on open networks.
David Braue |
12 Jan |
Read more
A global effort to improve awareness of mobile-app privacy policies could gain further weight after Apple released new figures confirming that mobile apps continue to be bought and downloaded at record-breaking pace.
David Braue |
09 Jan |
Read more
The OpenSSL project has kicked off the new year with fixes for handful of bugs that fortunately are not as disastrous as Heartbleed or POODLE.
Liam Tung |
09 Jan |
Read more
Despite a few security hiccups, Apple's OS X and iOS platforms have been generally very secure. While all users are potentially vulnerable to phishing attacks and identity theft, Apple's platforms have been solid. But that seems to be changing with the identification of a flaw in Apple's Thunderbolt ports that can used to write custom code into the Mac's boot ROM.
Anthony Caruana |
08 Jan |
Read more
Security experts are likely to remain unsatisfied with an explanation by the Federal Bureau of Investigation’s boss as to how they linked North Korea to the attacks on Sony.
Liam Tung |
08 Jan |
Read more
Qubes. a Fedora-based OS that aims to improve desktop security through virtualised isolated environments, has released two fixes for “security problems” and its first statement confirming that it hasn’t been ordered by a government to install a backdoor.
Liam Tung |
06 Jan |
Read more
European companies in the business of selling spyware and exploits to international governments and law enforcement will need a special licence from 31 December 2014
Liam Tung |
19 Dec |
Read more
Cybercriminals behind the TorrenLocker malware may have earned as much as $585,000 over several months from 39,000 PC infections worldwide, of which over 9,000 were from Australia.
Liam Tung |
17 Dec |
Read more
The UK’s Government Communications Headquarters (GCHQ), which may have used the Regin malware, has released a far less menacing app that teaches students how to make and break secrets
Liam Tung |
16 Dec |
Read more
Much of the problem with today's security environment is that it's hard to know who to trust – but the US Department of Justice believes it has the answer: companies should trust the government's efforts around cybersecurity more than they currently do, the DOJ is suggesting. The same goes in Australia, where the newly formed Australian Cyber Security Centre was soliciting reports of security breaches to inform its work
David Braue |
15 Dec |
Read more
The US Department of Homeland Security (DHS) is urging users of Siemens’ industrial control software to update their systems after finding signs the notorious BlackEnergy malware exploited recently patched flaws.
Liam Tung |
12 Dec |
Read more
The newly-operational Australian Cyber Security Centre (ACSC) has kicked off its efforts to catalogue the incidence of cyber-security breaches, calling on businesses and government agencies to report breaches through a page on its Web site.
David Braue |
11 Dec |
Read more