Govt leaks 10,000 asylum seekers' personal data
20 February, 2014 by Andrew CollinsThe Australian Department of Immigration and Border Protection has leaked the personal details of about 10,000 asylum seekers in detention, potentially endangering lives. Two investigations have been launched into the leak.
Akamai completes purchase of DDoS vendor Prolexic
19 February, 2014 by Dylan Bushell-EmblingAkamai has acquired DDoS specialist Prolexic for about $411 million (US$370 million), as part of plans to offer security products designed to protect enterprises at both the web and application layers.
Kickstarter hacked, CC info allegedly safe
18 February, 2014 by Andrew CollinsPopular crowd-funding website Kickstarter has been hacked, with attackers accessing the data - including mailing addresses, phone numbers and encrypted passwords - of several of the website's users.
Kaspersky and Absolute feud over vulnerability allegations
17 February, 2014 by Dylan Bushell-EmblingHow hard are security companies expected to try to contact vendors before publishing reports that may cast their products in a bad light? The controversy ensuing from a report published last week by Kaspersky Lab revolves around this question.
Top five access control trends for 2014
17 February, 2014 by Jordan Cullis, Director of Sales, Australia and New Zealand, HID GlobalAccess control solutions will continue to evolve in the coming year, including the increasing prevalence of multifactor authentication, mobile access control and NFC-based authentication.
With data privacy in the spotlight, encryption use grows
13 February, 2014 by Dylan Bushell-EmblingAround 35% of businesses polled in a survey of eight markets including Australia have adopted enterprise-wide encryption in response to consumer concerns and cyber threats.
New Spanish cyber threat may be nation-state-sponsored
13 February, 2014Security researchers have uncovered a potentially nation-state-sponsored, Spanish language-based cyber threat that has been active since at least 2007.
Cyber threats evolve in 2013
13 February, 2014 by Dylan Bushell-EmblingCyber threats including phishing attacks and mobile malware evolved in 2013, placing Australian businesses and consumers at increasing risk of having personal and financial data stolen, according to a new report.
Imperva goes on security buying spree
10 February, 2014 by Dylan Bushell-EmblingImperva has announced plans to acquire two cloud security vendors and a mainframe database auditing software company.
Australians too sexy for their unsecured devices
06 February, 2014 by Dylan Bushell-EmblingFour in ten Australians have sent or received intimate messages and photos via smartphones and other devices, potentially jeopardising their identity and reputation, according to McAfee.
Yahoo provides little detail on Yahoo Mail attack
04 February, 2014Cybercrims have undertaken a "coordinated" campaign to break into some number of Yahoo Mail accounts, but Yahoo has released scant details on the specifics of the attack, including how many accounts were targeted.
Ten tips for user password security
03 February, 2014 by David Attard*We keep on hearing of more and more password leaks, hacks, identities being stolen and loss of personal information. Help your users generate better passwords - and look after them better - with these tips.
Is your fridge really a spambot in disguise?
27 January, 2014 by Dylan Bushell-EmblingWhile some pundits are questioning the accuracy of a report claiming IoT devices, including a smart fridge, were compromised to send malicious emails, there's little question that the threat is credible.
Your staff: the weakest link in cybersecurity
14 January, 2014 by Ammar Hindi*News stories about hackers obtaining data on millions of customer accounts might grab attention, but are they that far removed from the situations of the organisations that most of us work for?
Yahoo! ad malware attack worse than thought
14 January, 2014 by Andrew CollinsA recent malware attack that saw Yahoo! serving malware to users of its websites affected more users than originally thought and may have caused affected computers to become 'bitcoin slaves', generating bitcoins for the attackers.