Security

How to stop a data breach before it happens

12 September, 2013 by Don Jacob*

Cybersecurity breaches are keeping more IT leaders awake than ever before - but what if you could predict where and when they’ll occur? Almost every cybersecurity threat - including malware, DDoS and cyberespionage - is preceded by early warning signs that any IT manager can look out for.


Yahoo! gave data on 300+ users to Aussie government

10 September, 2013 by Andrew Collins

Yahoo! gave the Australian government data on at least 305 of its users in the first half of 2013.


Turnbull redfaced after filter policy "clusterf**k"

06 September, 2013 by Dylan Bushell-Embling

The Coalition government has released and almost immediately denied a policy requiring filters to be installed by default on mobile phones and modems sold in Australia.


Five steps to prepare for the next security threat cycle

05 September, 2013 by Chris Wood*

About every five years, attackers launch new types of threats - and a new wave is upon us. These steps can help to avoid being compromised by this new wave.


Microsoft and Google to sue US government

03 September, 2013 by Andrew Collins

Microsoft and Google will move ahead with litigation against the US government, in order to gain permission to disclose greater detail about the customer information they are compelled to reveal to US agencies under the US's Foreign Intelligence Surveillance Act (FISA).


Facebook gave 380+ users' data to Aussie government

29 August, 2013 by Andrew Collins

Facebook granted Australian authorities access to data on at least 384 of the social network's users in the first half of 2013.


Security - the antithesis of innovation?

29 August, 2013 by Dr Hugh Thompson*

It's commonly said in IT that security is the antithesis of innovation. Innovation creates disruption, and disruption introduces vulnerability. But is that really the case?


APAC DDoS protection market booming

21 August, 2013 by Dylan Bushell-Embling

Demand for DDoS protection technology is booming in APAC, but doubts about the value of such solutions still linger in Australia and other markets.


Cybercrooks using Google Cloud Messaging to target Android

19 August, 2013 by Dylan Bushell-Embling

Google's Cloud Messaging Service, used to let Android app developers interface with their programs, is attracting the attention of malware authors.


Chinese NYT hackers back in action

14 August, 2013

The group that infiltrated New York Times networks over a four-month period last year appear to have launched new campaigns using upgraded versions of targeted attack malware.


NZ spy law could rock nation’s ICT sector

08 August, 2013 by Dylan Bushell-Embling

ICT groups opposed to NZ’s proposed new interception amendments fear the rules could reduce the competitiveness of domestic companies and force international players out of the market.


UPDATED: Aussie defence agencies ban Lenovo due to backdoor fears

30 July, 2013

Computers from Chinese company Lenovo have been banned from “classified” networks of the intelligence and defence services of Australia, the United States, Britain, Canada and New Zealand due to concerns that the machines could easily be hacked.


Russia buying typewriters to avoid data leaks

16 July, 2013

The Russian agency responsible for Kremlin security is reportedly buying typewriters in an effort to avoid digital data leaks.


A new government could rethink data breach law

09 July, 2013 by Dylan Bushell-Embling

While whichever party wins the next Australian Federal election is expected to pass some form of data breach notification law, a change of guard could prompt changes to the current proposed bill - including its axing.


Bad habits are worse than bad guys in IT security

05 July, 2013 by Matt Ramsay, Asia-Pacific Regional Director, Centrify | Supplied by: Centrify Asia Pacific

Do we only need to guard against the bad guys trying to hack our infrastructure? Or do we need to defend ourselves from the bad habits of the good guys who manage that infrastructure?


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd