UK govt warned of smart meter risks in 2012
29 March, 2016 by Dylan Bushell-EmblingThe UK Department for Energy and Climate Change was warned back in 2012 that its planned nationwide smart meter rollout poses a potentially significant security risk, reports indicate.
Privileged credentials — keys to the IT kingdom
24 March, 2016 by Sam Ghebranious, ANZ Regional Director, CyberArk | Supplied by: Cyberark Software (Australia) PtyIn the battle to protect sensitive data, organisations often overlook protection of their privileged SSH keys, thus leaving a gaping hole in their defences.
D-Link 10-port DGS-1100-10MP and 26-port DGS-1100-26MP surveillance switches
24 March, 2016 | Supplied by: D-Link Australia Pty LtdD-Link has expanded its family of Power over Ethernet (PoE) switches with two models, the 10-port DGS-1100-10MP and 26-port DGS-1100-26MP, specifically designed for surveillance applications.
Dell Data Protection Endpoint Recovery Free Edition
23 March, 2016 | Supplied by: Dell TechnologiesDell has released Data Protection Endpoint Recovery Free Edition, which helps businesses protect and recover the data on their Windows desktops, laptops and tablets from system failure or user error.
Vulnerabilities found in half of top 50 PC applications
17 March, 2016 by Dylan Bushell-EmblingAn annual study from Flexera's Secunia Research shows that 2048 vulnerabilities were found among 25 of the top 50 applications found on private PCs in 2015.
Major websites compromised by malvertising
17 March, 2016 by Dylan Bushell-EmblingMSN, the BBC, The New York Times and other major websites have had their web ads compromised by a widespread malvertising campaign seeking to distribute ransomware to US victims.
Australia a major target of Nemucod malware
14 March, 2016 by Dylan Bushell-EmblingNemucod, a malicious file designed to install ransomware and other malware, disproportionately targets markets including Australia, Japan and parts of Europe.
Trojan targets major Australian bank apps
10 March, 2016 by Dylan Bushell-EmblingESET Australia has discovered an insidious new mobile banking Trojan targeting major banks from Australia, NZ and Turkey that is capable of bypassing some two-factor authentication.
Dell Data Protection Rapid Recovery
10 March, 2016 | Supplied by: Dell TechnologiesThe Dell Data Protection Rapid Recovery helps organisations better protect business-critical systems, applications and data — either on premises or in the cloud.
Accenture Cyber Intelligence Platform
10 March, 2016 | Supplied by: AccentureThe Accenture Cyber Intelligence Platform combines managed security, artificial intelligence, cloud and analytic services for behavioural intelligence on demand, at speed and at scale.
Porn clicker malware could be hiding in your apps
09 March, 2016 by Dylan Bushell-EmblingSecurity researchers at Bitdefender have identified nine unsuspecting apps on the Google Play store containing hidden 'porn clicker' malware.
Cybersecurity professionals lax with their own security
09 March, 2016 | Supplied by: Centrify Asia PacificAn on-site survey at a recent cybersecurity conference in the US shows many IT professionals are lax with their own security when it comes to wearable technology.
ASX, Chi-X pass ASIC cyber resilience assessment
09 March, 2016 by Dylan Bushell-EmblingASIC has published a report evaluating the cyber resilience of the ASX and Chi-X exchanges, as well as the good practices being implemented by other financial sector organisations.
Ixia Vision ONE Turnkey device
09 March, 2016 | Supplied by: IXIAIxia has launched Vision ONE, a turnkey device designed to rapidly collect, process and filter data and application flow to security and monitoring analytics.
Point-of-sale vulnerabilities are not going away
02 March, 2016 by Christopher Strand, PCIP, Senior Director of Compliance and Governance, Carbon BlackWith point-of-sale attacks continuing, PoS and payment providers will need to build allegiances and share information more than ever in 2016.