Security pros slam LinkedIn mobile app
31 October, 2013 by Dylan Bushell-EmblingLinkedIn's new Intro app, designed to insert profile data from the social network into users' emails on iOS devices, has been called "a dream for attackers" by security experts.
AAPT privacy breach censure a "wake-up call"
24 October, 2013 by Dylan Bushell-EmblingThe finding that AAPT breached the Privacy Act by failing to protect customer data from hackers serves as a reminder for other organisations to prepare for privacy reforms taking effect next year.
'Vulnagressive' ad library poses threats: FireEye
21 October, 2013 by Dylan Bushell-EmblingResearchers from security vendor FireEye say the behaviour of a mobile ad library used in 1.8% of the most popular Android apps presents broad security risks.
Unified threat management explained
15 October, 2013 by Pat DevlinUnified threat management (UTM) systems combine a firewall with other security features, centralising visibility, reporting and security controls in a single device to simplify management of network security.
Backdoor discovered in D-Link routers
15 October, 2013 by Andrew CollinsSeveral D-Link router models contain a vulnerability that would give an interloper complete administrative access over the devices, according to one vulnerability researcher.
Taking the IT out of security
10 October, 2013 by Angela Coble*The greatest gain we have seen in IT, and security more specifically, has been without a "product" or "technology" but with simple messages and human interaction, argues Angela Coble.
Cisco completes Sourcefire purchase
09 October, 2013 by Dylan Bushell-EmblingCisco has completed the $2.7b acquisition of Sourcefire, to further its goal of developing a threat-centric approach to security.
Hackers steal 2.9 million Adobe customers' info, Adobe source code
08 October, 2013 by Andrew CollinsHackers have broken into Adobe's network and stolen information on 2.9 million Adobe customers - including names and encrypted credit card numbers - as well as source code for the company's products.
Samsung strongarmed Nokia with insider Apple info, says Nokia
07 October, 2013 by Andrew CollinsApple has asked a US court for sanctions against Samsung, alleging that Samsung executives illegally had access to confidential information on an Apple-Nokia deal. Nokia, meanwhile, has alleged that Samsung execs used that information to gain an unfair advantage when negotiating a license deal with Nokia.
Kylie is most dangerous Aussie celeb to search for
19 September, 2013 by Dylan Bushell-EmblingKylie Minogue has supplanted her sister Dannii as the most dangerous Australian celebrity to search for information about online, a McAfee study shows.
Voice biometrics in the finance industry
17 September, 2013 by Brett Feldon*Voice biometrics contact centre technology provides a way for banks and financial institutions to improve security and customer engagement.
Huawei blasts US for "illegal action"
17 September, 2013 by Andrew CollinsChinese networking vendor Huawei has accused the United States of taking "illegal action", after the release of a report claiming the NSA targeted the vendor for surveillance.
How to stop a data breach before it happens
12 September, 2013 by Don Jacob*Cybersecurity breaches are keeping more IT leaders awake than ever before - but what if you could predict where and when they’ll occur? Almost every cybersecurity threat - including malware, DDoS and cyberespionage - is preceded by early warning signs that any IT manager can look out for.
Yahoo! gave data on 300+ users to Aussie government
10 September, 2013 by Andrew CollinsYahoo! gave the Australian government data on at least 305 of its users in the first half of 2013.
Turnbull redfaced after filter policy "clusterf**k"
06 September, 2013 by Dylan Bushell-EmblingThe Coalition government has released and almost immediately denied a policy requiring filters to be installed by default on mobile phones and modems sold in Australia.