Get ready for Trump fake ransomware: ‘trump.exe’ and ‘Trump Screen of Death’
Can the world handle the 'Donald Trump Screen of Death'?
Can the world handle the 'Donald Trump Screen of Death'?
China suggests Donald Trump use a phone made by Huawei, the company banned from Australian and US 5G networks.
Cybersecurity pundits have been talking about strategies to boost cooperation amongst the various elements of the industry to reach common goals around information protection.
David Braue | 17 Jul | Read more
Observers of this month’s G20 meeting are still scratching their heads over the proposed strategic cybersecurity partnership between the United States and Russia, whose leader Vladimir Putin went into the meeting expecting chastising over alleged Russian interference in the US elections.
David Braue | 10 Jul | Read more
It may have taken a year to complete, but TechnologyOne is confident that government security certification for a software as a service (SaaS) platform will prove enticing for agencies that are increasingly enlisting outside help to ensure the security of their mandatory digital transformation efforts.
David Braue | 26 May | Read more
US president Donald Trump’s controversial travel ban had security executives seriously concerned, even as the new leader prepared and then delayed the signing of a far-reaching order around government cybersecurity.
David Braue | 06 Feb | Read more
The inauguration of Donald Trump as US president led some to wonder whether a DDoS attack on Whitehouse.gov can be considered as a legitimate protest like any other. There was also buzz as outgoing president Obama’s pardon of secret leaker Chelsea Manning led to [an offer by Julian Assange to face extradition to the US.
David Braue | 23 Jan | Read more
The cyber-war between nation states is just getting started, a geopolitical cybersecurity analyst has warned as US president Barack Obama weighs a response to Russian election hacking that will increase tensions on the global cybersecurity landscape inherited by successor Donald Trump.
David Braue | 21 Dec | Read more
Data breaches continue to get bigger and badder, with Yahoo announcing the compromise of 1 billion accounts – back in 2013, meaning that hackers had three years to abuse the breach. As with the other biggest data breaches suffered throughout the year, there were several things every user should do.
David Braue | 19 Dec | Read more
CISOs are still few and far between in Australia, where new figures suggest many companies are channelling money into security consultants rather than hiring information-security executives.
David Braue | 13 Dec | Read more
The US election had the tech world – and, indeed, the entire world – waiting with bated breath as the FBI decided, again, not to charge Hillary Clinton in its investigation of her private email server.
David Braue | 14 Nov | Read more
Broad adoption of electronic voting machines may have provided a step forward for many jurisdictions in today’s United States election, but the diversity of software platforms and potentially insecure operating systems has cybersecurity experts on edge as the polls close and counting begins in the country’s historic battle between Hillary Clinton and Donald Trump.
David Braue | 09 Nov | Read more
Revelations that a massive database of deidentified Medicare data could be reverse-engineered led to the data set's pulling from the Internet even as Telstra Health faced accusations that it couldn't possibly resist the temptation to do bad things with sensitive health information after it was awarded a major health-information consolidation tender.
David Braue | 04 Oct | Read more
As 2015 rolled into its last days, security pundits were dusting off their crystal balls to talk about what we can expect to see in the market during 2016. And, if Donald Trump's statements about closing the Internet come to fruition, 2016 could be particularly interesting as the year that encryption died. One endpoint security specialist was also hastening the end of endpoint encryption, forecasting a shift of encryption controls towards |other techniques such as whitelisting.
David Braue | 22 Dec | Read more