Hackers steal $1 million from Aussie bitcoin service
12 November, 2013 by Andrew CollinsHackers have stolen more than $1 million dollars' worth of bitcoins from an Australian bitcoin wallet service, according to the operator of the service.
'Silver surfers' exposed to cybercrime
11 November, 2013 by Dylan Bushell-EmblingOlder Australians are using the internet nearly as often as teenagers, but a lack of awareness about cybercrime risk is leaving them vulnerable to fraud.
Kylie is most dangerous Aussie celeb to search for
19 September, 2013 by Dylan Bushell-EmblingKylie Minogue has supplanted her sister Dannii as the most dangerous Australian celebrity to search for information about online, a McAfee study shows.
Largest cyberattack ever; Dell in three-way buyout bidding war; Telecom NZ reveals UFB plans
02 April, 2013 by Andrew CollinsIn the news this week: spam-fighter Spamhaus comes under largest cyberattack ever, two new Dell suitors enter the picture and Telecom New Zealand reveals pricing for its Ultra-Fast Broadband services.
The threat matrix
19 March, 2013 by Anthony CaruanaSecurity is always high up on the list of issues IT decision makers need to manage. One of the most challenging aspects of security is that the types of threats are changing and the environment we’re protecting is shifting as mobility, the cloud and other trends alter the way we work. Anthony Caruana spoke with four security gurus to get their views on the changing threat matrix.
Passwords can be harvested from PCs in standby mode
21 August, 2012When a computer is switched off, any passwords you used to login to web pages, banks or other financial accounts evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole that exploits the way computer memory works and could be used to harvest passwords and other sensitive data from a PC even if it is in standby mode.
How to mitigate damage from a distributed denial of service (DDoS) attack
15 May, 2012 by Neal Quinn, Chief Operating Officer, ProlexicAcross the internet, distributed denial of service (DDoS) attacks continue to increase in size and intensity. Businesses can minimise the damage from a DDoS with a well rehearsed DDoS mitigation plan, or 'playbook'.
Adobe Flash Player zero day attack targets defence manufacturers
07 May, 2012Cybercriminals are exploiting a vulnerability in Adobe Flash Player in a targeted attack on manufacturers of defence products. According to Symantec, the attackers will soon cast a broader net aimed at a wider variety of organisations.
Booter shell scripts turn DDoS attacks into child’s play, warns Prolexic
27 April, 2012DDoS protection service provider Prolexic Technologies has, today, released a threat advisory on the use of booter shells, which allow hackers to launch distributed denial of service (DDoS) attacks without the need for vast networks of infected zombie computers.
5 tips to beat business phone fraud
23 March, 2012Telstra Business has sent warnings to its customers and issued a list of security tips following an increase in cases of hackers gaining unauthorised access to business phone systems.
Cyber criminals are targeting mobile devices, warns latest AVG report
27 January, 2012Internet and mobile security software distributor AVG has released it's latest Community Powered Threat Report which provides insight, background and analysis on the trends and developments in cybercrime over the previous 3 months. The Q4 2011 report includes the risks of QR codes, stolen digital certificates bypassing security on mobile phones and the persistence of rootkits.
Largest DDoS in 2011 hits Asian organisation
24 November, 2011The largest distributed denial of service (DDoS) attack of 2011 took place two weeks ago, according to Prolexic Technologies, a company that offers DDoS protection services.
Expect more severe DDoS attacks this holiday season
01 November, 2011Distributed denial of service (DDoS) attacks are likely to last longer than usual during the upcoming holiday season, particularly against companies with e-commerce presences.
Expect chaos and catastrophes in security landscape
14 October, 2011 by Merri MackIT departments are being urged to make use of new technologies like social media, mobility, virtualisation and the cloud. Each of these carries new security risks and IT departments must learn new tactics to successfully secure them, as Merri Mack explains.
Eighty per cent of Aussie businesses experience IT security attacks
17 May, 2011Most Australian businesses experienced an IT security attack in 2010, in the form of viruses, worms, phishing attacks or hacks, according to new research from Webroot.