Phishing scam at RMIT
An email account at RMIT University in Melbourne has resulted in a user account in the Credit Management area being compromised and sending messages to former students.
Anthony Caruana | 01 Aug | Read more
An email account at RMIT University in Melbourne has resulted in a user account in the Credit Management area being compromised and sending messages to former students.
Anthony Caruana | 01 Aug | Read more
Security pundits have warned of the imminent hacking threat to critical infrastructure providers, but a new Ponemon Institute survey of infrastructure operators suggests the threat is already here.
David Braue | 30 Jul | Read more
A group of nearly 100 University of Adelaide computer science students is beginning their third day in a computer-security intensive program that was co-ordinated by a School of Computer Science security researcher and PhD candidate.
David Braue | 23 Jul | Read more
Think of the perfect attack like the perfect murder. It must be planned carefully and meticulously then executed systematically and flawlessly. Remember all the small detail in Hitchcock’s “The Rear Window”? No-one would have noticed anything or even missed the victim if it weren’t for Jimmy Stewart, who, with a broken leg had nothing better to do all day than to gaze out his rear window.
Dr Claudia Johnson | 26 Jun | Read more
The three laws of thermodynamics – “you can’t win, you can’t even break even, and you can’t even get out of the game” – can be applied to hackers who only have to succeed once and get access to one piece of data for you to have lost, said consultant Dan Klein at AusCERT 2014 event.
Anthony Caruana | 22 May | Read more
For most people, a home router is their window to the world -- the World Wide Web.
Taylor Armerding | 20 May | Read more
Latest research commissioned by Juniper Networks has found the online black market demonstrates many similarities to other free markets.
Patrick Budmar | 09 Apr | Read more
HP's annual Pwn2Own contest has been run and won. Critical flaws in every major browser, which allowed remote code execution, were found as well as issues with Adobe's Flash and Reader products. Pwn2Own is a hacker contest that runs within the CanSecWest event in Vancouver. Hackers are offered cash prizes as incentives as well as donations of computer hardware and other prizes given to the security researchers.
Anthony Caruana | 15 Mar | Read more
Digital comic book junkies will need to reset their ComiXology passwords following a security breach.
Jared Newman | 06 Mar | Read more
Apple has released a patch for iOS and says an OS X fix will be released 'very soon'
InfoWorld staff | 23 Feb | Read more
Germany's Der Spiegel reports that the NSA has compromised a wide range of hardware for years to enable its spying
InfoWorld staff | 31 Dec | Read more
Hackers are using a new exploit for a bug in Java 6 to attack victims, but don’t expect a patch any time soon -- unless you decide to pay Oracle for long term Java support.
Internet watchdog group says legitimate business web sites are unwittingly being used as a conduit to relay child porn images
Steve Ragan | 07 Aug | Read more
Like U.S. corporations, universities are battling a growing number of cyberattacks, believed to be mostly from China
Antone Gonsalves | 18 Jul | Read more
Everyone wants to do it, but the 'how' of innovation can often feel elusive. For Craig Penfold, the head of technology at Yahoo!7, innovation often involves late nights, pizza and, at around 5am in the morning, a Spotify playlist of '80s trash.
Rohan Pearce | 08 Jul | Read more