Security

Customer privacy can be a business opportunity

14 May, 2014 by Dali Kaafar, Principal Researcher and privacy expert in NICTA's Networks Research Group

Organisations are increasingly hungry for their customers' personal data. However, the need to keep this data private raises a host of limitations and legal considerations.


Malware posing a growing threat to enterprises

12 May, 2014 by Dylan Bushell-Embling

Around 84% of enterprises had malware operating on their networks in 2013, and more than half had users downloading malware every two hours, Check Point research indicates.


Privacy policies must be clear and simple: OAIC

07 May, 2014 by Dylan Bushell-Embling

Australian organisations must better inform customers about how personal data will be handled, and those that voluntarily report data breaches will be given preferential treatment, OAIC commissioners said.


SaaS security: you're doing it wrong

06 May, 2014 by Andrew Collins

Your approach to securing software-as-a-service (SaaS) is wrong. But don't worry - it's not entirely your fault.


IoT to transform enterprise security

05 May, 2014 by Dylan Bushell-Embling

The Internet of Things (IoT) technology paradigm will have an even greater effect on enterprise IT security programs than the BYOD, cloud and mobility trends, Gartner analyst Earl Perkins believes.


CSIRO warns new cyberthreats will dwarf 'Heartbleed'

05 May, 2014 | Supplied by: CSIRO Head Office

A report from the CSIRO warns that hackers could steal billions of dollars and disrupt critical infrastructure in the cyberattacks of tomorrow.


Online casinos used to launder cybercrime money

29 April, 2014 by Dylan Bushell-Embling

Due to the popularity and anonymity of online gambling sites, cybercriminals have started using them to launder money and pay for services on the black market, according to McAfee.


Chinese spies had MPs' emails for one year; US judge rules on data sovereignty

29 April, 2014

Chinese spies that accessed Australia's parliamentary computer network in 2011 may have been in there for a whole year. Meanwhile, a US judge has ruled Microsoft must hand over customer data even though that data is stored outside the US.


Kaspersky leads anti-malware ranking

28 April, 2014 by Dylan Bushell-Embling

Kaspersky, Emisoft, Avira and BitDefender all blocked 99.8% of malware from live malicious URLs during a comparative test, and Kaspersky also scored highest on detecting malicious files.


Microsoft enforces "new world order" with 8.1 Update

24 April, 2014 by Dylan Bushell-Embling

Microsoft has been accused of bullying and employing high-pressure tactics for its decision to end support for Windows 8.1 for consumers in May, unless they have downloaded a cumulative update.


UXC, Senetas team up on data security

24 April, 2014 by Dylan Bushell-Embling

UXC and Senetas have formed a partnership to offer tailored encryption products for government and enterprise customers.


Nine threat patterns account for 92% of all security incidents

23 April, 2014 by Dylan Bushell-Embling

Verizon security researchers have applied big data analytics to 10 years of security incident reports, and found that 92% of attacks can be traced to nine threat patterns.


iBanking malware can spy on Android users

22 April, 2014 by Dylan Bushell-Embling

A piece of Android malware uncovered by ESET allows attackers to capture SMS, voice calls and even audio, and a trojan targeting Facebook users appears to be making use of the app.


ACCC apologises for data breach

17 April, 2014 by Andrew Collins

The ACCC has apologised for leaking the email addresses of some subscribers to its information alert services, and has warned potentially affected users to beware of potential scammers capitalising on the breach.


Securing Windows XP after support cut off

15 April, 2014 by Andrew Collins

Continuing to use Windows XP after the support cut-off is a risky endeavour. However, it is possible to reduce this risk, and potentially avoid paying Microsoft for expensive custom support.


  • All content Copyright © 2025 Westwick-Farrow Pty Ltd