Yahoo provides little detail on Yahoo Mail attack
04 February, 2014Cybercrims have undertaken a "coordinated" campaign to break into some number of Yahoo Mail accounts, but Yahoo has released scant details on the specifics of the attack, including how many accounts were targeted.
Is your fridge really a spambot in disguise?
27 January, 2014 by Dylan Bushell-EmblingWhile some pundits are questioning the accuracy of a report claiming IoT devices, including a smart fridge, were compromised to send malicious emails, there's little question that the threat is credible.
Snowden, espionage shape security landscape in '13
04 December, 2013 by Dylan Bushell-EmblingThe revelations of whistleblower Edward Snowden and the emergence of cyber-mercenaries were two of this year's key cybersecurity trends.
Victorian Government unprepared for cyberattacks
03 December, 2013Victorian government agencies are underprepared to deal with cyberattacks on their ICT systems, according to a report from the state's auditor-general.
Hackers steal $1 million from Aussie bitcoin service
12 November, 2013 by Andrew CollinsHackers have stolen more than $1 million dollars' worth of bitcoins from an Australian bitcoin wallet service, according to the operator of the service.
'Silver surfers' exposed to cybercrime
11 November, 2013 by Dylan Bushell-EmblingOlder Australians are using the internet nearly as often as teenagers, but a lack of awareness about cybercrime risk is leaving them vulnerable to fraud.
Kylie is most dangerous Aussie celeb to search for
19 September, 2013 by Dylan Bushell-EmblingKylie Minogue has supplanted her sister Dannii as the most dangerous Australian celebrity to search for information about online, a McAfee study shows.
Largest cyberattack ever; Dell in three-way buyout bidding war; Telecom NZ reveals UFB plans
02 April, 2013 by Andrew CollinsIn the news this week: spam-fighter Spamhaus comes under largest cyberattack ever, two new Dell suitors enter the picture and Telecom New Zealand reveals pricing for its Ultra-Fast Broadband services.
The threat matrix
19 March, 2013 by Anthony CaruanaSecurity is always high up on the list of issues IT decision makers need to manage. One of the most challenging aspects of security is that the types of threats are changing and the environment we’re protecting is shifting as mobility, the cloud and other trends alter the way we work. Anthony Caruana spoke with four security gurus to get their views on the changing threat matrix.
Passwords can be harvested from PCs in standby mode
21 August, 2012When a computer is switched off, any passwords you used to login to web pages, banks or other financial accounts evaporate into the digital ether, right? Not so fast! Researchers in Greece have discovered a security loophole that exploits the way computer memory works and could be used to harvest passwords and other sensitive data from a PC even if it is in standby mode.
How to mitigate damage from a distributed denial of service (DDoS) attack
15 May, 2012 by Neal Quinn, Chief Operating Officer, ProlexicAcross the internet, distributed denial of service (DDoS) attacks continue to increase in size and intensity. Businesses can minimise the damage from a DDoS with a well rehearsed DDoS mitigation plan, or 'playbook'.
Adobe Flash Player zero day attack targets defence manufacturers
07 May, 2012Cybercriminals are exploiting a vulnerability in Adobe Flash Player in a targeted attack on manufacturers of defence products. According to Symantec, the attackers will soon cast a broader net aimed at a wider variety of organisations.
Booter shell scripts turn DDoS attacks into child’s play, warns Prolexic
27 April, 2012DDoS protection service provider Prolexic Technologies has, today, released a threat advisory on the use of booter shells, which allow hackers to launch distributed denial of service (DDoS) attacks without the need for vast networks of infected zombie computers.
5 tips to beat business phone fraud
23 March, 2012Telstra Business has sent warnings to its customers and issued a list of security tips following an increase in cases of hackers gaining unauthorised access to business phone systems.
Cyber criminals are targeting mobile devices, warns latest AVG report
27 January, 2012Internet and mobile security software distributor AVG has released it's latest Community Powered Threat Report which provides insight, background and analysis on the trends and developments in cybercrime over the previous 3 months. The Q4 2011 report includes the risks of QR codes, stolen digital certificates bypassing security on mobile phones and the persistence of rootkits.