Security

OAIC examines Census attack; Oracle MICROS breach; Linux TCP weakness

18 August, 2016 by Andrew Collins

Privacy Commissioner satisfied no Census data was stolen, Russian criminals breach hundreds of Oracle systems, and dangerous Linux security weakness found.


Ixia iBypass VHD bypass switch

17 August, 2016 | Supplied by: Keysight Network Solutions

Ixia has released iBypass VHD, a modular, high-density, inline bypass switch.


Attackers scraping data from LinkedIn

15 August, 2016 by Dylan Bushell-Embling

LinkedIn has filed a lawsuit seeking to identify and obtain an injunction against unknown attackers who have been illegally scraping data from the enterprise social media platform since December.


Security summit for Sydney in September

15 August, 2016 by Dylan Bushell-Embling

Palo Alto Networks' first Australian cybersecurity summit will bring together a number of local and international experts to discuss how organisations should shape their security strategies.


AUSTRAC team to target online terrorism

11 August, 2016

Australia's primary financial intelligence agency, AUSTRAC, has established a new cyber team dedicated to identifying online terrorism financing activities, money laundering and financial fraud.


Checkpoint SandBlast Agent malware protection for web browsers

11 August, 2016 | Supplied by: Check Point Software Technologies Ltd

Check Point has released SandBlast Agent for browsers, with zero-phishing technology.


'Strider' targets Europe, Asia; Telstra's 5G tests; ACCC to study comms market

11 August, 2016 by Andrew Collins

Symantec says many targets have been attacked with 'Strider' malware, ACCC to scrutinise competition in the comms market, and Telstra to test Ericsson's 5G technology.


ABS blames DDoS attacks for census outage

10 August, 2016 by Dylan Bushell-Embling

The government is sending mixed signals as to the cause of last night's eCensus system outage, with the ABS blaming DDoS attacks and the Prime Minister attributing the cause to hardware failures.


Ceding control to attackers — without knowing it

10 August, 2016 by Vincent Goh, Regional Vice President, Asia Pacific, CyberArk | Supplied by: Cyberark Software (Australia) Pty

IT security strategies are not complete unless they protect access to administrator credentials and improve domain controller security.


Critical infrastructure vulnerabilities surging

08 August, 2016 by Dylan Bushell-Embling

There has been a steep rise in disclosed vulnerabilities in the industrial control systems that manage critical infrastructure including electric grids and water supplies, and a full third of these have no patches available.


LogRhythm Freemium network monitor

08 August, 2016 | Supplied by: LogRhythm Inc

LogRhythm has released the Freemium network monitor. It is a commercial-grade network monitoring, forensics and analytics product suitable for advanced threat detection and incident response.


DDoS attacks were more frequent and longer in Q2

04 August, 2016 by Dylan Bushell-Embling

Kaspersky Lab's latest DDoS research indicates that both the frequency and length of attacks increased in Q2 as Linux botnets became larger attack vectors.


Bug bounty program for software vulnerabilities

03 August, 2016

Kaspersky Lab recently launched a bug bounty program with HackerOne.


South Australia Police choose NEC facial recognition

02 August, 2016

NEC Australia has been selected to deliver South Australia Police's (SAPOL) facial recognition system.


Top Mac AV programs have a 100% hit rate

01 August, 2016 by Dylan Bushell-Embling

AV-Comparatives has tested the major third-party Mac antivirus programs, and each was able to detect 100% of the top 50 most popular and recent malware samples.


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd