Customer privacy can be a business opportunity
14 May, 2014 by Dali Kaafar, Principal Researcher and privacy expert in NICTA's Networks Research GroupOrganisations are increasingly hungry for their customers' personal data. However, the need to keep this data private raises a host of limitations and legal considerations.
Malware posing a growing threat to enterprises
12 May, 2014 by Dylan Bushell-EmblingAround 84% of enterprises had malware operating on their networks in 2013, and more than half had users downloading malware every two hours, Check Point research indicates.
Privacy policies must be clear and simple: OAIC
07 May, 2014 by Dylan Bushell-EmblingAustralian organisations must better inform customers about how personal data will be handled, and those that voluntarily report data breaches will be given preferential treatment, OAIC commissioners said.
SaaS security: you're doing it wrong
06 May, 2014 by Andrew CollinsYour approach to securing software-as-a-service (SaaS) is wrong. But don't worry - it's not entirely your fault.
IoT to transform enterprise security
05 May, 2014 by Dylan Bushell-EmblingThe Internet of Things (IoT) technology paradigm will have an even greater effect on enterprise IT security programs than the BYOD, cloud and mobility trends, Gartner analyst Earl Perkins believes.
CSIRO warns new cyberthreats will dwarf 'Heartbleed'
05 May, 2014 | Supplied by: CSIRO Head OfficeA report from the CSIRO warns that hackers could steal billions of dollars and disrupt critical infrastructure in the cyberattacks of tomorrow.
Online casinos used to launder cybercrime money
29 April, 2014 by Dylan Bushell-EmblingDue to the popularity and anonymity of online gambling sites, cybercriminals have started using them to launder money and pay for services on the black market, according to McAfee.
Chinese spies had MPs' emails for one year; US judge rules on data sovereignty
29 April, 2014Chinese spies that accessed Australia's parliamentary computer network in 2011 may have been in there for a whole year. Meanwhile, a US judge has ruled Microsoft must hand over customer data even though that data is stored outside the US.
Kaspersky leads anti-malware ranking
28 April, 2014 by Dylan Bushell-EmblingKaspersky, Emisoft, Avira and BitDefender all blocked 99.8% of malware from live malicious URLs during a comparative test, and Kaspersky also scored highest on detecting malicious files.
Microsoft enforces "new world order" with 8.1 Update
24 April, 2014 by Dylan Bushell-EmblingMicrosoft has been accused of bullying and employing high-pressure tactics for its decision to end support for Windows 8.1 for consumers in May, unless they have downloaded a cumulative update.
UXC, Senetas team up on data security
24 April, 2014 by Dylan Bushell-EmblingUXC and Senetas have formed a partnership to offer tailored encryption products for government and enterprise customers.
Nine threat patterns account for 92% of all security incidents
23 April, 2014 by Dylan Bushell-EmblingVerizon security researchers have applied big data analytics to 10 years of security incident reports, and found that 92% of attacks can be traced to nine threat patterns.
iBanking malware can spy on Android users
22 April, 2014 by Dylan Bushell-EmblingA piece of Android malware uncovered by ESET allows attackers to capture SMS, voice calls and even audio, and a trojan targeting Facebook users appears to be making use of the app.
ACCC apologises for data breach
17 April, 2014 by Andrew CollinsThe ACCC has apologised for leaking the email addresses of some subscribers to its information alert services, and has warned potentially affected users to beware of potential scammers capitalising on the breach.
Securing Windows XP after support cut off
15 April, 2014 by Andrew CollinsContinuing to use Windows XP after the support cut-off is a risky endeavour. However, it is possible to reduce this risk, and potentially avoid paying Microsoft for expensive custom support.