Articles
BlueKeep exploit found in the wild
The security researcher who named the BlueKeep vulnerability has warned that honeypots set up to detect such attacks have been targeted by threat actors. [ + ]
ATSE urges focus on cyber resilience
The Australian Academy of Technology and Engineering has urged the government to focus on cyber resilience while developing its 2020 Cyber Security Strategy. [ + ]
Almost 60% of Australian casual workers feel disengaged at work
A survey has revealed how employers can bring out the best in their casual workers, with workforce management solutions part of the answer. [ + ]
E-waste disposal — the other data security threat?
It's important that IT professionals and organisations put in place policies for the safe disposal of storage devices and the data they contain. [ + ]
ACCC suing Google over location data collection
The ACCC has taken Google to federal court, alleging that the company engaged in false or misleading conduct related to its collection and use of location data. [ + ]
Privacy complaints to OAIC grew 12% in FY19
Privacy complaints to the Office of the Australian Information Commissioner grew to 3306 during the last financial year. [ + ]
Process killed the innovation star
Limiting our focus to a particular process or solution rather than the desired outcome of our customer is an easy trap to fall into, says ITPA's Sean Bates. [ + ]
Phishing sites using HTTPS to trick users
Nearly a third (29%) of phishing web pages uncovered by Webroot during 1H19 were using HTTPS encryption to appear legitimate. [ + ]
Industry discourages expats' return despite skills shortage
Returning expats could help fill the skills gap facing the technology industry if only Australian companies would hire them, a new report has shown. [ + ]
Huawei claims tacit ACCC endorsement
Huawei said the ACCC's decision not to challenge its affadavits for the VHA v ACCC case represents an admittance TPG needs Huawei to deploy a mobile network. [ + ]
'FinalBlacklist' to help businesses hone cybersecurity
Researchers have released the "largest publicly available data set" of malicious activity to help businesses hone their cybersecurity capabilities. [ + ]
Penten, Data61 to advance cyber decoy research
Canberra-based Penten and the CSIRO's Data61 will collaborate to support research and development on cyber decoy and cyber trap capabilities. [ + ]
ANU outlines "shockingly sophisticated" cyber attack
The ANU has published a forensic investigation into what VC Brian Schmidt has called a "shockingly sophisticated" targeted cyber attack on its systems. [ + ]
What does DoH mean for BYOD?
When it comes to IT, security and safety aren't always synonymous. Sometimes, measures that increase security remove the ability to provide safeguards. [ + ]
Picking the right cloud could save your business
As the enterprise software market moves rapidly to the cloud, businesses need to know which kind of cloud is required to ensure sustained success. [ + ]