Security > Cybercrime

Planes crashing into planes: the reality of cybercrime?

04 April, 2011 by Andrew Collins

Security vendors like to throw around various apocalyptic scenarios in order to convince IT and security chiefs to buy the latest security doodads. But how realistic are these scenarios? Andrew Collins spoke to one penetration tester about the likelihood of one particular scenario: hackers compromising an airline’s IT security in order to blow up an aeroplane.


‘Money mule’ scam targets job seekers

29 March, 2011

Symantec researchers have detected a new phishing scam that targets job seekers, turns them into inadvertent money launderers and hands unlimited access to their bank accounts over to cybercriminals.


Five business practices that allow cybercriminals to access company data

23 February, 2011

The reality of cybercrime is that many businesses make it easy for both malicious and inadvertant breaches of company IT security to occur. Rigorous adoption, implementation and enforcement of in-house security guidelines can help limit the threats to data security. These five tips are a good place to start.


A decade of cybercrime

11 February, 2011

Since 2000, the number of internet users has grown fivefold from 361 million to 2 billion in 2011. We’ve also seen explosive growth in services and products available online. Today, almost any activity - from personal banking to shopping and social networking - can be carried out over the internet. As such, it has become a treasure trove of money and information that cybercriminals can exploit for their personal gain.


Cyber security spurns evaluation centre

08 December, 2010

With cybercrime becoming rife, Huawei has opened a cyber security evaluation centre in the UK to ensure its hardware and software systems will be tested to withstand cyber security threats.


Challenge for the cloud

17 November, 2010

The ease of use and accessibility have made cloud computing a popular concept. Now, with the onset of the cloud computing era, it will be up to law enforcement officials, particularly in computer crime forensics, to keep cloud safe for all users.


Telstra faces up to Cyber Storm test

30 September, 2010

Working closely with government, enterprise customers and industry organisations, Telstra is ready to be put to the test by Cyber Storm III - an international cyber security exercise.


Hit-and-run attack one of the top security threats in June

05 July, 2010

Fortinet has published its June 2010 Threat Landscape report which showed that new variations of the Sasfis botnet have entered the malware Top 10 list.


Creation of oversighting system proposed by ACS to address cybercrime

13 October, 2009

The Australian Computer Society (ACS) has released a report, by leading cyber-safety experts, which recommends the creation of an independent, oversighting system and an annual auditing process for black lists if compulsory ISP filtering is introduced.


Detective receives international award for cybercrime efforts

20 July, 2009

Brian Hay, Detective Superintendent of the Queensland Police Service, has won the McAfee Cybercrime Fighter Award.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd